The Art of Cryptography in Ancient and Medieval History

Development debates are common, especially regarding topics such as security.
While working with my team on setting up secure communication, we started a discussion about the configuration of an encryption key. With our insatiable technical curiosity being at least as important as our thirst for debate, I decided to start exploring these concepts to learn more about how the art of encryption was shaped throughout the years.
Little did I know that a whole world would open up before me.
Today, I invite you to jump into a time machine and join me on this journey to discover cryptography, the art of making a message secret through history. In this three-part blog series, we will observe the underlying concepts, we will play with these mechanisms through historical anecdotes, and will see their evolution until today.
For the first part of our adventure through time, we will visit ancient and medieval civilizations.
Let the journey begin!
Prepare for time travel
We are about to travel through time to understand the origins of cryptography. Like any journey, we have to prepare ourselves. Here is a short glossary that will come in handy:
Cryptography refers to encryption which is the process of making a normal message (plaintext) unintelligible (ciphertext). To go back to the normal message, you have to decrypt it. An algorithm and a key are used to encrypt and decrypt the message.
To make a message secret, we can :
- make a substitution by character — this is encryption (e.g. replace with the next letter in the alphabet).
- make a substitution by word/logical chunk —it is the coding (e.g. translate in another language)
- concealing one's own existence — this is called steganography (e.g. invisible ink)
For the sake of simplicity, In this article series, I will only be covering encryption and encrypted messages.
Feeling ready? Let’s jump in!
The art of cryptography 2000 BC – 800 AD
The secrets of ancient Egypt
We just traveled 4000 years into the past, and we just landed in the ancient Egyptian town of Menat Khufu, in the tomb of the nobleman, Khnumhotep II. Take a look at those unusual hieroglyphic inscriptions, have you had any difficulty reading them?😉 It's ok; it is probably because it contains unusual hieroglyphs used as a way to confuse an unexpected reader.

Using an unusual symbol, or switching it, is a basic and simple way to encrypt a message. You may have doubts about this one, and you are right. This example is controversial because these specificities could be due to the context — like our legal vocabulary that uses sometimes uncommon words — a stylistic effect or the evolution of the language itself.
In any case, a tomb is not the best place to discuss; let's go to our next stop in time.
The most Spartan encryption
We've made a big jump, we are in Greece, 3rd century BC, and we are searching for Apollonius of Rhodes. I would love to ask him about the famous Argonautica, but we are here to talk about cryptography! We see no one at the meeting point, instead, we have a weird cylinder with a strip of parchment waiting for us.

You may have guessed, that cylinder is a scytale ( Ancient Greek: σκυτάλη skutálē "baton, cylinder", also σκύταλον skútalon). In cryptography terminology, the scytale is the key to encrypting and decrypting the message.
As the system is pretty simple to crack, another interpretation is that this mechanism is used more for authentication than encryption. Both communicants must have the same cylinder characteristics to write and read the message, so the receiver is waiting for a specific ciphered message size, and an interceptor will not be able to corrupt the content easily.
Let's play with it to fully understand the concept. I want to send you a message, in plaintext: This is my first encrypted message
. But it is a secret message, remember? So, I need to encrypt it. We exchange the type of scytale we want to use (physical characteristics). I take a scytale (the key) and I wrap the strip of parchment around, then I write the message:
0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 |
---|---|---|---|---|---|---|---|
T | h | i | s | i | s | m | y |
f | i | r | s | t | e | n | c |
r | y | p | t | e | d | m | e |
s | s | a | g | e |
Then I unwrap the parchment and obtain the encrypted message: Tfrshiysirpasstgiteesedmnmyce
. The least we can say is that this message has lost its clarity, hasn't it?
To decrypt this message, you take your scytale with the predefined physical characteristics (the key), wrap the parchment around it, and… tadaaaa! You can now read the original plaintext message.
Excellent — we discovered and used the first encryption mechanism! Of course, it was a first naive approach that could be improved, for example, by adding unexpected characters or using a complex scytale form.
This logical group permutation algorithm is called transposition cipher.
One moment, I can hear the sound of a clash... Indeed, this technique was commonly used by the Spartans during military campaigns, I think it would be more prudent to leave right away!
Encrypted Babylon
We are around 200 BC, near Jerusalem, and we are searching for the Book of Jeremiah. Why so? This text contains Hebrew words that have been encrypted using a method called Atbash (Hebrew: אתבש; also transliterated Atbaš). Atbash derives from the first two letters Aleph and Taw and the last two letters Bet and Shin in the Hebrew alphabet.
Position | 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Aleph | Bet | Gimel | Daleth | Heh | Vav | Zayin | Het | Tet | Yodh | Kaph | Lamed | Mem | Nun | Samech | Ayin | Peh | Tzady | Koof | Reish | Shin | Taw | |
Plain text | א | ב | ג | ד | ה | ו | ז | ח |