Product Code Database
Example Keywords: tie -stockings $99-186
   » » Wiki: List Of Cryptographers
Tag Wiki 'List Of Cryptographers'.
Tag

This is a list of cryptographers. is the practice and study of techniques for secure communication in the presence of third parties called adversaries.


Pre twentieth century
  • Al-Khalil ibn Ahmad al-Farahidi: wrote a (now lost) book on cryptography titled the " Book of Cryptographic Messages".
  • , 9th century polymath and originator of frequency analysis.
  • Athanasius Kircher, attempts to decipher crypted messages
  • Augustus the Younger, Duke of Brunswick-Lüneburg, wrote a standard book on cryptography
  • : published several cipher alphabets that were used to encrypt magic formulas.
    (2025). 9781111138219, Course Technology.
  • , wrote an occult book, which in fact was a cover for crypted text
  • Ibn 'Adlan: 13th-century cryptographer who made important contributions on the sample size of the frequency analysis.
  • Duke of Mantua Francesco I Gonzaga is the one who used the earliest example of homophonic Substitution cipher in the early 1400s.David Salomon. Coding for Data and Computer Communications. Springer, 2005.Fred A. Stahl. " A homophonic cipher for computational cryptography" Proceedings of the national computer conference and exposition (AFIPS '73), pp. 123–126, New York City, 1973.
  • : gave detailed descriptions of eight cipher systems that discussed substitution ciphers, leading to the earliest suggestion of a "tableau" of the kind that two centuries later became known as the "Vigenère table".
  • Ahmad al-Qalqashandi: Author of Subh al-a 'sha, a fourteen volume encyclopedia in Arabic, which included a section on cryptology. The list of ciphers in this work included both substitution and transposition, and for the first time, a cipher with multiple substitutions for each plaintext letter.
  • , UK, 19th century mathematician who, about the time of the , secretly developed an effective attack against polyalphabetic substitution ciphers.
  • Leone Battista Alberti, /universal , inventor of polyalphabetic substitution (more specifically, the ), and what may have been the first mechanical encryption aid.
  • Giovanni Battista della Porta, author of a seminal work on .
  • Étienne Bazeries, French, military, considered one of the greatest natural cryptanalysts. Best known for developing the "" and his influential 1901 text Les Chiffres secrets dévoilés ("Secret ciphers unveiled").
  • Giovan Battista Bellaso, Italian cryptologist
  • Giovanni Fontana (engineer), wrote two encrypted books
  • Hildegard of Bingen used her own alphabet to write letters.
  • , Roman general/politician, has the named after him, and a lost work on cryptography by Probus (probably Valerius Probus) is claimed to have covered his use of military cryptography in some detail. It is likely that he did not invent the cipher named after him, as other substitution ciphers were in use well before his time.
  • Friedrich Kasiski, author of the first published attack on the Vigenère cipher, now known as the .
  • Auguste Kerckhoffs, known for contributing cipher design principles.
  • Edgar Allan Poe, author of the book, A Few Words on Secret Writing, an essay on cryptanalysis, and The Gold Bug, a short story featuring the use of letter frequencies in the solution of a cryptogram.
  • Johannes Trithemius, mystic and first to describe tableaux (tables) for use in polyalphabetic substitution. Wrote an early work on and cryptography generally.
  • Philips van Marnix, lord of Sint-Aldegonde, deciphered Spanish messages for William the Silent during the Dutch revolt against the Spanish.
  • codebreaker for Cromwell and Charles II
  • Sir Charles Wheatstone, inventor of the so-called and general polymath.


World War I and World War II wartime cryptographers
  • Richard J. Hayes (1902–1976) Irish code breaker in World War II.
  • (1925–2023), British code breaker in World War II
  • (1905–1986), Swedish mathematician and cryptographer.
  • Lambros D. Callimahos, US, , worked with William F. Friedman, taught NSA cryptanalysts.
  • Ann Z. Caracristi, US, SIS, solved Japanese Army codes in World War II, later became deputy director of National Security Agency.
  • Alec Naylor Dakin, UK, Hut 4, during World War II.
  • Ludomir Danilewicz, , , helped to construct the Enigma machine copies to break the ciphers.
  • Patricia Davies (born 1923), British code breaker in World War II
  • Alastair Denniston, UK, director of the Government Code and Cypher School at from 1919 to 1942.
  • Agnes Meyer Driscoll, US, broke several Japanese ciphers.
  • Genevieve Grotjan Feinstein, US, SIS, noticed the pattern that led to breaking Purple.
  • Elizebeth Smith Friedman, US, Coast Guard and US Treasury Department cryptographer, co-invented modern cryptography.
  • William F. Friedman, US, SIS, introduced statistical methods into .
  • Cecilia Elspeth Giles, UK,
  • Jack Good UK, Government Code and Cypher School, worked with on the statistical approach to cryptanalysis.
  • Nigel de Grey, UK, Room 40, played an important role in the decryption of the Zimmermann Telegram during World War I.
  • , UK, Room 40 and Government Code and Cypher School, broke commercial Enigma cipher as used by the (German military intelligence).
  • US, SIS, helped break the Japanese Red cipher, later Chief Scientist at the National Security Agency.
  • Frank W. Lewis US, worked with William F. Friedman, puzzle master
  • William Hamilton Martin and Bernon F. Mitchell, U.S. National Security Agency cryptologists who defected to the Soviet Union in 1960
  • UK, Special Operations Executive cryptography director, author and playwright.
  • UK, Government Code and Cypher School, worked on Cryptanalysis of the Lorenz cipher and the Colossus computer.
  • , US, cryptographer for the Naval Applied Science Lab
  • , UK, Government Code and Cypher School, headed the section that developed the Colossus computer for Cryptanalysis of the Lorenz cipher.
  • French, broke the during the First World War.
  • , , Biuro Szyfrów, a Polish mathematician and cryptologist who, in 1932, solved the with plugboard, the main cipher device then in use by Germany. The first to break the cipher in history.
  • John Joseph Rochefort US, made major contributions to the break into JN-25 after the attack on Pearl Harbor.
  • US, SIS, deduced that the Japanese Purple machine was built with stepping switches.
  • US, SIS, leader of the team that broke Purple.
  • Jerzy Różycki, , Biuro Szyfrów, helped break German Enigma ciphers.
  • , Italy, Italian General and author of the Manual of Cryptography.
  • US, chief cryptographer for the US Navy for 2 decades+, including World War II.
  • US, SIS.
  • UK, Brigadier, Room 40, Government Code and Cypher School, , , . Extraordinary length and range of cryptographic service
  • UK, Government Code and Cypher School, where he was chief cryptographer, inventor of the that was used in decrypting , mathematician, logician, and renowned pioneer of .
  • William Thomas Tutte UK, Government Code and Cypher School, , with , broke Lorenz SZ 40/42 encryption machine (codenamed Tunny) leading to the development of the Colossus computer.
  • Betty Webb (code breaker), British codebreaker during World War II
  • William Stone Weedon, US,
  • UK, Government Code and Cypher School, where he was head of Hut Six (German Army and Air Force . ), made an important contribution to the design of the .
  • US, , author "The American Black Chamber", worked in China as a cryptographer and briefly in Canada.
  • , , Biuro Szyfrów, inventor of Zygalski sheets, broke German ciphers pre-1939.
  • Karl Stein German, Head of the Division IVa (security of own processes) at Cipher Department of the High Command of the Wehrmacht. Discoverer of .
  • Gisbert Hasenjaeger German, Tester of the Enigma. Discovered new proof of the completeness theorem of Kurt Gödel for .
  • German, Worked in Division IVa at OKW. Logician and pen friend of Alan Turning.
  • Gottfried Köthe German, Cryptanalyst at OKW. Mathematician created theory of topological vector spaces.
  • German, Mathematician at OKW. Mathematical Discoveries Named After Ernst Witt.
  • German, worked in and geometric function theory. He introduced Grunsky's theorem and the Grunsky inequalities.
  • .
  • Oswald Teichmüller German, temporarily employed at OKW as cryptanalyst. Introduced quasiconformal mappings and differential geometric methods into . Described by Friedrich L. Bauer as an extreme Nazi and a true genius.
  • German, Mathematician at AA/Pers Z, the German department of state, civilian diplomatic cryptological agency.
  • Wolfgang Franz German, Mathematician who worked at OKW. Later significant discoveries in .
  • Werner Weber German, Mathematician at OKW.
  • German, Mathematician at OKW. His doctoral student was Friedrich L. Bauer.
  • German, Mathematician who worked as a linguist at the Cipher Department of the High Command of the Wehrmacht.
  • German, Mathematician who worked at OKW.
  • Erich Hüttenhain German, Chief cryptanalyst of and led Chi IV (section 4) of the Cipher Department of the High Command of the Wehrmacht. A German mathematician and cryptanalyst who tested a number of German cipher machines and found them to be breakable.
  • German, Chief Cryptologist and Director of Cipher Department of the High Command of the Wehrmacht.
  • German, Worked alongside Dr Erich Hüttenhain at Cipher Department of the High Command of the Wehrmacht. Mathematician, logician, cryptanalyst and linguist.
  • German. Inventor of SG39 and SG41.


Other pre-computer
  • , US, Architect and notable amateur cryptologist who authored books and taught classes on the subject to civilians at .
  • Claude Elwood Shannon, US, founder of information theory, proved the to be unbreakable.


Modern
See also: for a more exhaustive list.


Symmetric-key algorithm inventors


Asymmetric-key algorithm inventors


Cryptanalysts
  • , English cryptanalyst and numismatist best known for her work as a code-breaker at Bletchley Park during the Second World War.
  • Ross Anderson, UK.
  • , Israel, co-discoverer of differential cryptanalysis and Related-key attack.
  • , US.
  • , US, Stanford University.
  • , Netherlands, co-inventor of Twofish and Fortuna.
  • , Canada, University of Waterloo.
  • , Denmark, DTU, discovered integral cryptanalysis.
  • Paul Kocher, US, discovered differential power analysis.
  • , Japan, discoverer of linear cryptanalysis.
  • , UK, previously Royal Holloway, now , known for several attacks on cryptosystems.
  • David Wagner, US, , co-discoverer of the and .
  • , the People's Republic of China, known for MD5 and SHA-1 hash function attacks.
  • , University of Luxembourg, known for impossible differential cryptanalysis and .
  • , .
  • Bill Buchanan, creator of ASecuritySite - one of the most comprehensive cryptography website in the World.


Algorithmic number theorists
  • Daniel J. Bernstein, US, developed several popular algorithms, fought US government restrictions in Bernstein v. United States.
  • , US
  • Dorian M. Goldfeld, US, Along with Michael Anshel and Iris Anshel invented the Anshel–Anshel–Goldfeld key exchange and the . They also helped found .
  • , US, NYU Courant.


Theoreticians


Government cryptographers
  • , UK, , secret inventor of the algorithm later known as RSA.
  • James H. Ellis, UK, , secretly proved the possibility of asymmetric encryption.
  • , US, National Security Agency
  • , US, National Security Agency
  • , US, National Security Agency
  • Malcolm Williamson, UK, , secret inventor of the protocol later known as the Diffie–Hellman key exchange.


Cryptographer businesspeople


See also


External links

Page 1 of 1
1
Page 1 of 1
1

Account

Social:
Pages:  ..   .. 
Items:  .. 

Navigation

General: Atom Feed Atom Feed  .. 
Help:  ..   .. 
Category:  ..   .. 
Media:  ..   .. 
Posts:  ..   ..   .. 

Statistics

Page:  .. 
Summary:  .. 
1 Tags
10/10 Page Rank
5 Page Refs
1s Time