Loading summary
A
You're listening to the Cyberwire Network, powered by N2K. Maybe that's an urgent message from your CEO, or maybe it's a deepfake trying to target your business. Doppel is the AI native social engineering defense platform fighting back against impersonation and manipulation. As attackers use AI to make their tactics more sophisticated, Doppel uses it to fight back from automatically dismantling cross channel attacks to building team resilience and more Doppel outpacing what's next in social engineering. Learn more@doppel.com that's D O P E L dot com.
B
The word is AES. Spelled A for advanced, E for encryption and S for standard. Definition A US government specification for data encryption using an asymmetric key algorithm. Example sentence AES was developed by the National Institute of Standards and Technology, or NIST, in 2001 and established a standard by the US federal government in 2002. Origin and Context Every time I revisit this subject of encryption, I always feel like I have to relearn the definitions again. My senior moment brain can't seem to keep them all straight. In a nod to one of my favorite superhero movies of all time, into the spider verse, when all the multi dimensional spider people take turns explaining their origin story by saying alright, let's do
A
this one last time.
B
Let's do this one last time For Cryptography the art and science of code making encryption converts plain text into an unrecognizable form using the codes that cryptographers make. Signing uses trapdoor or mathematical one way functions from cryptography for non repudiation. In other words, signed messages or file authors can't deny that they signed it and it's mathematically impossible for a third party to forge a signature. Keys a string of characters used within a cryptographic function to transform plain text into ciphertext or back. Like a physical key, it locks data so that only someone with the right key can unlock it. Cryptanalysis the reverse of cryptography. It's all the things you do to break the codes. Like Alan Turing using Bayes rule to break the German Enigma coding machines in World War II. And just to make things more confusing, cryptology captures both disciplines, cryptography and cryptanalysis. The cryptography idea has been around since the world was young. According to the Thales group, The Spartans around 600 BC used a device called a scytel to code plain text into encrypted messages. In order for their spartan friends to decode the messages on the other side, they needed an identical scytel in terms of width and length. By 60 BC, the Romans used a simple substitution cipher where they encoded messages by shifting the letter by some agreed upon number. For example, if the number was 3, the plain text of the letter A becomes an encoded letter D, the plain text B becomes an encoded E, and so forth. Fast forward to 1553. Giovan Battista Bellasso introduced the idea of a secret key or password that two parties would need to encrypt and decrypt messages. If Fred and Ginger want to exchange secret messages, they both would have to have the secret key. Fred would encode the message with the key and Ginger would decode it with the same secret key. By 1917, an American named Edward Hebern had invented the electromechanical machine in which the key was invented embedded in a rotating disk. The next year, 1918, German engineer Arthur Scherbius invented the Enigma machine using more than one rotor. And the German military adopted it to send coded transmissions during World War I and World War II. By the 1970s, IBM invented a block cipher. Instead of using multiple letters as the Enigma rotors did, the key is an entire block of text. The US government adopted this model, the IBM Data Encryption Standard, or described DES, in 1973 and used it until it was broken in 1997. In 1976, Whitfield Diffie and Martin Hellman created the Diffie Hellman Key Exchange, making it possible to send encrypted messages without having to share a secret key beforehand. This was huge. It's called asymmetric encryption, and it's the main idea behind all modern day web transactions. There is a public key that anybody in the world can use to encrypt the message to Ginger. But Ginger is the only one that has the secret key that can decrypt any messages sent to her with the public key. The two keys, public and secret, are mathematically linked, but it's computationally impossible to use the public key to read the encrypted message. The next year, 1977, the team of Ron Rivest, Adi Shamir and Leonard Alderman, RSA, created the first working algorithm of the Diffie Hellman key exchange. By 2000, the Advanced Encryption Standard, or AES, replaced DES as the standard by being faster and having the ability to use much longer keys. Nerd reference. You're listening to the classic Clair de Lune. That's French for moonlight, written by French composer Claude Debussy and published in 1905. And it just happens to be some of the background music used in a fantastic little first person computer game called Cypher. That's C Y P H E R where you walk through a museum of cryptology and solve the multiple puzzles provided in various forms of cryptanalysis, steganography, transposition, mono alphabetic substitution, polyaphabetic substitution, mechanized cryptography, and digital cryptography. I got as far as the first puzzle before I got stumped. But hey, this might be. Word Notes is written by Tim Nodar, executive produced by Peter Kilpe and edited by John Petrick and me, Rick Howard. The mix, sound design and original music have all been crafted by the ridiculously talented Elliot Peltzman. Thanks for listening.
This episode of Hacking Humans (Word Notes, by N2K Networks) dives into the origins, evolution, and core concepts of encryption—with a particular focus on the Advanced Encryption Standard (AES). The host unpacks foundational cryptographic terminology, shares compelling origin stories from the history of codes, and explains how encryption has evolved alongside human ingenuity (and threat actors).
"Every time I revisit this subject of encryption, I always feel like I have to relearn the definitions again."
— The host, highlighting the perennial complexity of encryption.
"Encryption converts plain text into an unrecognizable form using the codes that cryptographers make." [02:18]
"Signed messages or file authors can't deny that they signed it and it's mathematically impossible for a third party to forge a signature." [02:28]
"By the 1970s, IBM invented a block cipher. Instead of using multiple letters as the Enigma rotors did, the key is an entire block of text." [03:31]
"[In 1976,]...the Diffie Hellman Key Exchange, making it possible to send encrypted messages without having to share a secret key beforehand. This was huge." [03:55]
"By 2000, the Advanced Encryption Standard, or AES, replaced DES as the standard by being faster and having the ability to use much longer keys." [04:17]
This concise yet vivid episode gives a whirlwind tour from ancient cryptographic origins to the robust modern backbone of secure communication—AES. Whether you’re revisiting the basics or learning them for the first time, this episode sheds light on why encryption remains central to cybersecurity, blending approachable storytelling with substantial technical insight.