Throughout history the need for secrecy has been important. This need for secrecy brought about the invention and the art of concealment, coding and code making [1]. As early as 1900 B.C., Egyptian scribes used hieroglyphs in a non-standard fashion, presumably to hide the meaning from those who did not know the meaning [2]. Cryptography is the effect of designing privacy requirements systems in communication [3]. From the past to the present, many classical encryption methods such as Caesar, Vigenere, and Enigma have been replaced by more powerful modern new encryption methods such as DES, RSA, PGP, AES, and SHA-3.

This study aims to present chronologically together about major cryptography methods and developmental stages in the history of cryptology.

1.
The Code Book
.
The Secret History of Codes and Code-Breaking
.
Simon Singh
1999
2.
Whitman
,
M.
&
Mattord
,
H.
(
2005
). Principles of information security. [University of Phoenix Custom Edition e-text].
Canada
,
Thomson Learning, Inc
. Retrieved May 4, 2009, from University of Phoenix, resource, CMGT/432
3.
Trappe
,
W.
ve Washington
,
C.
,
2002
.
Introducing to Cryptography with Coding Theory
,
New Jersey
:
Prentice Hall
4.
James J.
Tattersall
. Elementary Number Theory in Nine Chapters.
Cambridge University Press
. (|210|,
1999
). ISBN: 0521585317
5.
Kahn
D.
,
The Codebreakers
,
Macmillan
,
1967
, pp.
82
6.
Cohen
F.
, Short History of Cryptography,
1995
, retrieved 8 June 2010
7.
Al-Ehwany
,
Ahmad
Fouad
. (
1961
). “Al-Kindi” in
A History of Muslim Philosophy
Volume
1
.
New Delhi
:
Low Price Publications
. pp.
421
434
.
8.
Babaoğlu
A.
, “
Kriptolojinin Geçmişi
”,
Bilim ve Teknik, TÜBİTAK
, July
2009
, N:500, pp 24-27
9.
Ibrahim A.
Al-Kadi
(
1992
),
The origins of cryptology: The Arab contributions
,
Cryptologia
16
(
2
):
97
126
10.
Al-Vahed
A.
,
Sahhavi
H.
,
An overview of modern cryptography
,
World Applied Programming
, Vol (
1
), No (
1
), April 2011.
55
61
, ISSN:
14.
L. S.
Hill
, “
Cryptography in an algebraic alphabet
,”
American Mathematical Monthly
, vol.
36
, no.
6
, pp.
306
312
,
1929
.
15.
W.
Stallings
, Cryptography and Network Security, 5th ed.,
Boston
:
Prentice Hall
,
2011
.
17.
Diffie
W.
,
Hellman
M.
, “
New Directions in Cryptography
”,
IEEE Transactions on Information Theory
, vol.
IT-22
, Nov.
1976
, pp:
644
654
.
18.
https://aesencryption.net/, Date of access: July
2018
19.
Hernandez
,
P.
, (
2015
). “
NIST Releases SHA-3 Cryptographic Hash Standard
20.
https://en.wikipedia.org/wiki/SHA-3, Date of access: September
2018
This content is only available via PDF.