Lists of British Inventions - Cryptography


  • Playfair cipher - Charles Wheatstone
  • Bacon's cipher - Sir Francis Bacon
  • RSA cipher - Clifford Cocks developed the RSA algorithm at GCHQ, approximately three years before it was independently developed by Rivest, Shamir and Adleman at MIT. The British government were not interested in using Cocks' algorithm, so it was classified until 1998, when it was revealed that he had developed RSA before Rivest et al.

Read more about this topic:  Lists Of British Inventions

Other articles related to "cryptography":

Counting Points On Elliptic Curves
... study of various fields such as number theory, and more recently in cryptography and Digital Signature Authentication (See elliptic curve cryptography and elliptic curve DSA) ... they have important consequences in the solving of Diophantine equations, with respect to cryptography, they enable us to make effective use of the difficulty of the discrete logarithm ... The DLP, as it has come to be known, is a widely used approach to Public key cryptography, and the difficulty in solving this problem determines the level of security of the cryptosystem ...
Cryptography - Legal Issues - Digital Rights Management
... Cryptography is central to digital rights management (DRM), a group of techniques for technologically controlling use of copyrighted material, being widely implemented and deployed at the behest of some ... This had a noticeable impact on the cryptography research community since an argument can be made that any cryptanalytic research violated, or might violate, the DMCA ... Niels Ferguson, a well-respected cryptography researcher, has publicly stated that he will not release some of his research into an Intel security design for ...
Cryptography Research
... Cryptography Research, Inc. ... is a San Francisco based cryptography company specializing in applied cryptographic engineering, including technologies for building tamper-resistant semiconductors ... Cryptography Research protects its core operations from outside attack by maintaining a secured local network that is not connected to the Internet at all ...