Secret Ciphers and Codes from History – Infographic

Secret Ciphers and Codes from History – Infographic

Ciphers and Passwords have a lengthy history which long predates modern computing. Long before they were used by teenagers to protect their Snapchat accounts; generals, businesses, and spies all required secrecy for their communications. decided to investigate further, creating this visual collection of the most notable examples of secret codes from history.

Play Quizzes 4

Some of the earliest recorded systems of secrecy come from antiquity. The armies of ancient Sparta, famed for their military prowess in the field, were also ardent bureaucrats. Their unique Scytale method of encryption required messages to be written on a long stretch of hide, and then wrapped around a carved staff. Only when the message was wrapped around a staff of the same measurements could it be made legible again.

Some methods of disguising messages have proved less successful, for example the Babington Plot Cipher, used by Mary Queen of Scots to plot the murder of Queen Elizabeth I from her prison cell. This method simply swapped letters in the English alphabet into symbols. It was very quickly cracked, and Mary was promptly executed.

This Long/ Short Equity Firm Sees A Time-Arbitrage Opportunity In This Pest Control Merger

PestYost Partners was up 0.8% for the first quarter, while the Yost Focused Long Funds lost 5% net. The firm's benchmark, the MSCI World Index, declined by 5.2%. The funds' returns outperformed their benchmark due to their tilt toward value, high exposures to energy and financials and a bias toward quality. In his first-quarter letter Read More

In war, the stakes are highest, so the toughest codes come about. The Napoleonic Wars was an intense period of code cracking and encryption. It culminated in the ‘Great Paris Cypher’ which featured thousands of possible combinations of numbers, many red herrings, and several codes which all meant the same phrases. While previous French efforts to disguise their communications had been cracked in several days, it was not until the British captured a French code book, that they could they understand this intricate method of disguising military plans.

By the Second World War, communications had gone wireless, and were even easier to intercept. Germany’s response to this challenge was the Enigma machine, which had been created originally to encrypt business communications. Repurposed by the Third Reich, this multi-disc system of jumbling (and then unjumbling) messages was considered impossible to crack by many as the variables were reset every day. British codebreaker Alan Turing eventually managed to crack the code, using a unique machine which paved the way to modern computing.


As companies increasingly look towards biometrics and two-factor authentication, it leaves us wondering where encryption could go next.

Learn more about Ciphers below



Updated on

Sheeraz is our COO (Chief - Operations), his primary duty is curating and editing of ValueWalk. He is main reason behind the rapid growth of the business. Sheeraz previously ran a taxation firm. He is an expert in technology, he has over 5.5 years of design, development and roll-out experience for SEO and SEM. - Email: sraza(at)
Previous article Meet The Quant Investor And Developer Of The Market Avalanche Detector
Next article Why Sustainable Investing Is Gaining Momentum

No posts to display