{"id":37303,"date":"2020-04-08T15:25:48","date_gmt":"2020-04-08T12:25:48","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=37303"},"modified":"2025-08-29T15:07:17","modified_gmt":"2025-08-29T12:07:17","slug":"what-is-cryptography-who-are-the-cypherpunks","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/what-is-cryptography-who-are-the-cypherpunks\/","title":{"rendered":"What is cryptography? Who are the cypherpunks?"},"content":{"rendered":"<div id=\"cards_wrapper\">\n<div class=\"single_card\">\n<p id=\"card_counter_1\" class=\"card_counter\"><span class=\"card_counter_span\">1<\/span><\/p>\n<p><strong>What is cryptography?<\/strong><\/p>\n<div class=\"card_description\">Cryptography is the science of methods that ensure data authentication, integrity and confidentiality.<\/div>\n<\/div>\n<div class=\"single_card\">\n<p id=\"card_counter_2\" class=\"card_counter\"><span class=\"card_counter_span\">2<\/span><\/p>\n<p><strong>When did cryptography emerge, and how did it evolve?<\/strong><\/p>\n<div class=\"card_description\">\n<p>Cryptography as a technique for protecting text arose alongside writing: methods of secret writing were known in the ancient civilisations of India, Mesopotamia and Egypt.<\/p>\n<p>In its first period (roughly from the third millennium BC to the ninth century AD) monoalphabetic ciphers predominated. Their key principle is substitution: replacing the alphabet of the original text with another alphabet by swapping letters for other symbols or letters.<\/p>\n<p>Monoalphabetic ciphers were known in Judea, Sparta, ancient Greece and ancient Rome.<\/p>\n<p>In the second period (from the ninth century in the Middle East and from the fifteenth century in Europe to the early twentieth century) polyalphabetic ciphers spread widely. These are sets of monoalphabetic ciphers used to encrypt each successive character of the plaintext according to a defined rule.<\/p>\n<p>In the third period\u2014from the early to the mid-twentieth century\u2014polyalphabetic ciphers remained in use. In parallel, radio communications emerged and developed. They enabled instant transmission of large volumes of information but were not secure. Reliable encryption became a pressing issue during the first world war and even more so in the second, as small transmitters and receivers became widespread, allowing belligerents to intercept enemy traffic easily. Leading powers adopted electromechanical cipher machines and competed in codebreaking. Thanks to these forces, cryptography, long the preserve of spies, mathematicians and diplomats, began to take shape as an organised discipline.<\/p>\n<p>The fourth period\u2014from the mid- to late 1970s\u2014was marked by a shift to mathematical cryptography. By then, mathematical statistics, probability theory, number theory and general algebra had matured, and the foundations of cybernetics and algorithm theory had been laid.<\/p>\n<p>A key milestone in this transition was the publication of American mathematician and cryptanalyst <a href=\"https:\/\/ru.wikipedia.org\/wiki\/%D0%A8%D0%B5%D0%BD%D0%BD%D0%BE%D0%BD,_%D0%9A%D0%BB%D0%BE%D0%B4\" target=\"_blank\" rel=\"noopener noreferrer\">Claude Shannon<\/a>\u2019s \u201cCommunication Theory of Secrecy Systems\u201d. It presented, for the first time, an approach to cryptography as a mathematical science. Shannon formulated its theoretical underpinnings and introduced concepts with which students now begin their study of the field.<\/p>\n<p>After the second world war, the British and US governments created agencies for electronic surveillance and information security: Britain\u2019s Government Communications Headquarters and America\u2019s National Security Agency.<\/p>\n<p>In the early 1970s, GCHQ employee James Ellis <a href=\"https:\/\/ru.wikipedia.org\/wiki\/%D0%9A%D1%80%D0%B8%D0%BF%D1%82%D0%BE%D1%81%D0%B8%D1%81%D1%82%D0%B5%D0%BC%D0%B0_%D1%81_%D0%BE%D1%82%D0%BA%D1%80%D1%8B%D1%82%D1%8B%D0%BC_%D0%BA%D0%BB%D1%8E%D1%87%D0%BE%D0%BC\" target=\"_blank\" rel=\"noopener noreferrer\">proposed<\/a> the concept of public-key cryptography. In such a system, a public key transmitted over an unsecured, observable channel is used to encrypt messages and verify digital signatures. His colleague, British mathematician Clifford Cocks, developed the mathematical basis for the model.<\/p>\n<p>Neither GCHQ nor the NSA adopted public-key cryptography at the time because the requisite technology was lacking. A computer communications network (the internet) was needed, and such systems were not yet developed in the 1970s.<\/p>\n<p>In the 1980s computer scientists\u2014and in the 1990s, with the spread of the internet, ordinary users\u2014faced the problem of protecting data in an open environment.<\/p>\n<p>Meanwhile, small groups of hackers, mathematicians and cryptographers began working to realise public-key cryptography in practice. Among them was American cryptographer David Chaum, PhD, sometimes called the godfather of the cypherpunks.<\/p>\n<\/div>\n<\/div>\n<div class=\"single_card\">\n<p id=\"card_counter_3\" class=\"card_counter\"><span class=\"card_counter_span\">3<\/span><\/p>\n<p><strong>How did the cypherpunk movement arise?<\/strong><\/p>\n<div class=\"card_description\">\n<p>As early as 1982, Chaum presented the method of the blind digital signature\u2014a model of public-key cryptography. It enabled the creation of a database of people who could remain anonymous while guaranteeing the accuracy of the information they provided about themselves. Chaum dreamed of digital voting that could be verified without revealing the voter\u2019s identity, but above all of digital cash.<\/p>\n<p>Chaum\u2019s ideas inspired a group of cryptographers, hackers and activists. They became known as the cypherpunks\u2014members of a movement advocating computer technologies as a means to destroy state power and centralised systems of control.<\/p>\n<p>One of the movement\u2019s ideologues was American cryptographer and former Intel principal scientist Timothy May. In 1987 May met American economist, entrepreneur and futurist Phil Salin, founder of <a href=\"https:\/\/en.wikipedia.org\/wiki\/American_Information_Exchange\" target=\"_blank\" rel=\"noopener noreferrer\">American Information Exchange<\/a> (AMiX), an online marketplace for trading data.<\/p>\n<p>May disliked the idea of an electronic platform where people could sell each other (across borders and with low fees) trivial information. He dreamed of a global system enabling anonymous bilateral exchange of any information, resembling a corporate information system.<\/p>\n<p>He later finalised the concept as <a href=\"https:\/\/web.archive.org\/web\/20020730044602\/http:\/\/cypherpunks.venona.com:80\/date\/1993\/08\/msg00538.html\" target=\"_blank\" rel=\"noopener noreferrer\">BlackNet<\/a>, which required a non-governmental digital currency and the ability to make untraceable payments in it. In 1985 he read David Chaum\u2019s <a href=\"https:\/\/www.chaum.com\/publications\/Security_Wthout_Identification.html\" target=\"_blank\" rel=\"noopener noreferrer\">paper<\/a> \u201cSecurity without Identification: Transaction Systems to Make Big Brother Obsolete\u201d. In it, Chaum described a system that uses cryptographic methods to hide a buyer\u2019s identity. Exposure to this idea led May to study public-key cryptographic protection.<\/p>\n<p>He soon concluded that such cryptography, coupled with networked computing, could \u201cdestroy social power structures\u201d.<\/p>\n<p>In September 1988 May wrote \u201c<a href=\"https:\/\/activism.net\/cypherpunk\/crypto-anarchy.html\" target=\"_blank\" rel=\"noopener noreferrer\">The Crypto Anarchist Manifesto<\/a>\u201d, modelled on Karl Marx\u2019s \u201cThe Communist Manifesto\u201d: \u201cA spectre is haunting the modern world, the spectre of crypto anarchy.\u201d According to the manifesto, information technologies will allow people to govern their lives without governments, using cryptography, digital currencies and other decentralised tools.<\/p>\n<p>In 1992 May, Electronic Frontier Foundation co-founder John Gilmore, and Eric Hughes, a mathematician at the University of California, Berkeley, invited 20 close friends to an informal meeting. They discussed the most pressing cryptography and programming issues of the day. Such meetings became regular and sparked a movement. An email <a href=\"https:\/\/cryptoanarchy.wiki\/getting-started\/what-is-the-cypherpunks-mailing-list\" target=\"_blank\" rel=\"noopener noreferrer\">mailing list<\/a> was created to bring in others who shared the founders\u2019 interests and values. The list soon had hundreds of subscribers: they tested ciphers, exchanged ideas and debated new developments. Correspondence used the latest encryption methods of the time, such as PGP. Participants discussed politics, philosophy, computer science, cryptography and mathematics.<\/p>\n<p>In 1993 Eric Hughes published \u201c<a href=\"https:\/\/www.activism.net\/cypherpunk\/manifesto.html\" target=\"_blank\" rel=\"noopener noreferrer\">A Cypherpunk\u2019s Manifesto<\/a>\u201d, which set out the movement\u2019s core tenets:<\/p>\n<blockquote>\n<p><strong>\u201cPrivacy is necessary for an open society in the digital age. [\u2026] Privacy in an open society requires the use of cryptography. [\u2026] We, the cypherpunks, are called to create anonymous systems. We defend our privacy with cryptography, anonymous remailers, digital signatures and electronic money. [\u2026] Cryptography will inevitably spread worldwide, and with it the systems of anonymous transactions that it makes possible.\u201d<\/strong><\/p>\n<\/blockquote>\n<p>The importance of privacy, anonymous transactions and cryptographic protection\u2014all these ideas were later implemented, in various forms and to varying degrees, in cryptocurrencies.<\/p>\n<p>By 1997 the mailing list had around 2,000 subscribers and 30 messages a day. In 1995 WikiLeaks founder Julian Assange <a href=\"http:\/\/mailing-list-archive.cryptoanarchy.wiki\/authors\/julian_assange_proff_at_suburbia_net_\/\" target=\"_blank\" rel=\"noopener noreferrer\">posted<\/a> his first message to \u201cCypherpunks\u201d. In 2016 he published a book about the movement titled \u201cCypherpunks: Freedom and the Future of the Internet\u201d.<\/p>\n<p>The term \u201ccypherpunks\u201d was first used by hacker and programmer <a href=\"https:\/\/en.wikipedia.org\/wiki\/Jude_Milhon\" target=\"_blank\" rel=\"noopener noreferrer\">Jude Milhon<\/a> to describe a group of crypto-anarchists. Cypherpunk and crypto-anarchism are not identical but are kindred currents, sharing essentially the same values. <a href=\"https:\/\/forklog.com\/en\/news\/what-is-crypto%e2%80%91anarchism\">Crypto-anarchism<\/a> (crypto-anarchy) is a variety of anarchism in which anonymisation technologies, digital pseudonyms and cryptographically protected digital money are used to free people from state control\u2014surveillance, censorship and taxation.<\/p>\n<\/div>\n<\/div>\n<div class=\"single_card\">\n<p id=\"card_counter_4\" class=\"card_counter\"><span class=\"card_counter_span\">4<\/span><\/p>\n<p><strong>How did the cypherpunk movement shape the emergence of cryptocurrencies? <\/strong><\/p>\n<div class=\"card_description\">\n<p>In 1989 David Chaum founded DigiCash in Amsterdam. It specialised in digital money and payment systems; its flagship was the eCash digital money system with the unit CyberBucks. eCash used Chaum\u2019s blind digital-signature technology. Although some banks even tested the system and Microsoft reportedly discussed integrating eCash into Windows 95, the venture did not find commercial success.<\/p>\n<p>In 1997 British cryptographer Adam Back created Hashcash, an anti-spam mechanism that required a certain amount of computation to send emails. This made spamming uneconomic.<\/p>\n<p>A year later, computer engineer Wei Dai published a proposal for another digital payment system, called b-money. He outlined two concepts. The first envisaged a protocol in which every participant maintains a copy of the database recording how many funds each user controls. The second modified this by having the ledger\u2019s copies held not by every participant but by servers. It introduced two roles: regular users and servers (nodes). Honesty was incentivised by deposits into a special account used for rewards or penalties if misbehaviour was proven.<\/p>\n<p>It was the first concept that the creator of Bitcoin, Satoshi Nakamoto, later adopted; the second proved closest to what is now known as Proof-of-Stake.<\/p>\n<p>In 2004 cypherpunk Hal Finney, building on Adam Back\u2019s Hashcash, created <a href=\"https:\/\/nakamotoinstitute.org\/finney\/rpow\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">Reusable Proof of Work (RPoW)<\/a>. The idea was to create unique cryptographic tokens that, like unspent outputs in Bitcoin, could be used only once. The drawback was that validation and double-spend protection still relied on a central server.<\/p>\n<p>In 2005 cryptographer Nick Szabo, who in the 1990s developed the concept of <a href=\"https:\/\/forklog.com\/en\/news\/what-is-a-smart-contract\">smart contracts<\/a>, announced Bit Gold\u2014a digital collectible and store of value. Bit Gold drew on Hal Finney\u2019s RPoW proposal but, instead of one-time coins, envisaged coins with varying value calculated from the computational work required to create them.<\/p>\n<p>In October 2008 Satoshi Nakamoto sent the <a href=\"https:\/\/bitcoin.org\/bitcoin.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">white paper<\/a> \u201cBitcoin: A Peer-to-Peer Electronic Cash System\u201d to the mailing list. Its content shows the influence of cypherpunks and crypto-anarchists. The Bitcoin white paper cites Adam Back and Wei Dai. According to Nakamoto, Bitcoin \u201crepresents a realization of Wei Dai\u2019s b-money proposal\u2026 and Nick Szabo\u2019s Bit Gold proposal\u201d. In turn, Wei Dai\u2019s manifesto, in which he proposes b-money, opens: \u201cI admire Tim May\u2019s crypto-anarchism.\u201d After publishing the paper, Nakamoto carried on, and on 3 January 2009 mined the genesis block.<\/p>\n<p>Bitcoin\u2019s arrival ushered in a wave of technological refinements and innovations built on a working system\u2014extensions and modifications that cypherpunks embraced with gusto.<\/p>\n<\/div>\n<\/div>\n<div class=\"single_card\">\n<p id=\"card_counter_5\" class=\"card_counter\"><span class=\"card_counter_span\">5<\/span><\/p>\n<p><strong>How is the cypherpunk movement evolving? <\/strong><\/p>\n<div class=\"card_description\">\n<p>Contemporary cypherpunks include cryptographer and smart-contract pioneer Nick Szabo, BitTorrent developer Bram Cohen, Tor browser creator Jacob Appelbaum, and WikiLeaks founder Julian Assange, who in 2016 published a book about the movement titled \u201cCypherpunks: Freedom and the Future of the Internet\u201d, as well as many other developers and hackers.<\/p>\n<p>Today, many processes on the internet bear the imprint of cypherpunk activity. Torrents, VPNs and digital signatures were either created directly by cypherpunks or built using their ideas and tools.<\/p>\n<p>In 1993, in \u201cA Cypherpunk\u2019s Manifesto\u201d, Eric Hughes wrote:<\/p>\n<blockquote>\n<p><strong>\u201cCypherpunks write code. We know that someone must continue to write code to protect information, and since we see no other way to protect our data, we keep doing it [\u2026] Our code is available to anyone on earth. We are not overly concerned that some people dislike what we do. We know that our programs cannot be destroyed, and that the growing network can no longer be stopped.\u201d<\/strong><\/p>\n<\/blockquote>\n<p>Follow Forklog news on <a href=\"https:\/\/www.facebook.com\/forklog\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"> Facebook<\/a>!<\/p>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>1 What is cryptography? Cryptography is the science of methods that ensure data authentication, integrity and confidentiality. 2 When did cryptography emerge and how did it evolve? As a technique for protecting text, it arose alongside writing\u2014methods of secret writing were known in ancient India, Mesopotamia and Egypt. In the first period of development (roughly from the third millennium BC to the ninth century) monoalphabetic ciphers predominated [\u2026].<\/p>\n","protected":false},"author":1,"featured_media":37304,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"1","_short_excerpt_text":"","creation_source":"human_written","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[2113],"tags":[2120,2114,2115,1142,930],"class_list":["post-37303","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cryptorium","tag-101-anonymity","tag-101-decentralization","tag-101-technical-foundations","tag-cryptography","tag-cypherpunks"],"aioseo_notices":[],"amp_enabled":true,"views":"54","promo_type":"1","layout_type":"1","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/37303","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=37303"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/37303\/revisions"}],"predecessor-version":[{"id":37305,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/37303\/revisions\/37305"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/37304"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=37303"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=37303"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=37303"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}