0% found this document useful (0 votes)
26 views11 pages

JNTUK - University College of Engineering Vizianagaram

This document provides a brief timeline of important developments in cryptography and encryption techniques throughout history, including Egyptian hieroglyphs from 1900 BCE, Mesopotamian clay tablets from 1500 BCE, the Spartan Scytale from 700 BCE, the Caesar cipher from 49-44 BCE, the works of Al-Kindi from 800 AD, the Babington Plot of 1586, the Zimmerman Telegram from 1917, and the Enigma Machine from the 1930s.

Uploaded by

priyanka
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views11 pages

JNTUK - University College of Engineering Vizianagaram

This document provides a brief timeline of important developments in cryptography and encryption techniques throughout history, including Egyptian hieroglyphs from 1900 BCE, Mesopotamian clay tablets from 1500 BCE, the Spartan Scytale from 700 BCE, the Caesar cipher from 49-44 BCE, the works of Al-Kindi from 800 AD, the Babington Plot of 1586, the Zimmerman Telegram from 1917, and the Enigma Machine from the 1930s.

Uploaded by

priyanka
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

by

Siva Rama Krishna T.

Department of Computer Science and Engineering


JNTUK University College of Engineering Vizianagaram
www.jntukucev.ac.in
Egyptian hieroglyphs
1900 BCE
Mesopotamian clay tablets
1500 BCE
Spartan Scytale
700 BCE
Caesar cipher
49-44 BCE
Al-Kindi
800 AD
Babington Plot
1586
Zimmerman Telegram
1917
Enigma Machine
1930s

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy