Skip to timeline

TechBi Labs · Interactive Exhibit

CryptoTimeline

A journey through 2,000 years of secret writing — from Julius Caesar's shift cipher to lattice-based post-quantum cryptography. Scroll to explore each era.

50 BC
1977
2001
1977
1985
2024+
Scroll to explore
50 BCBroken

Caesar Cipher

The Birth of Secret Writing

01

Julius Caesar communicated with his generals using a simple shift cipher — each letter replaced by one three positions ahead in the alphabet. Revolutionary for its time, trivial by modern standards.

⚡Key space: only 25 possible keys — a child can brute-force it today
Skip to DES →
1977Broken

DES

The Government Standard

02

The Data Encryption Standard was adopted by NIST and used by banks worldwide. With a 56-bit key, it seemed unbreakable — until the EFF's Deep Crack machine cracked it in 22 hours.

⚡56-bit key = 2⁵⁶ possibilities — cracked in 22 hours in 1998
Skip to AES →
2001Secure

AES

The Unbreakable Standard

03

The Advanced Encryption Standard (Rijndael) won a global competition. AES-256 has a keyspace larger than the number of atoms in the observable universe. No practical attack exists.

⚡2²⁵⁶ keys — more than atoms in the observable universe
Skip to RSA →
1977Quantum Threatened

RSA

The Public Key Revolution

04

Rivest, Shamir and Adleman solved the key distribution problem. RSA lets strangers share secrets over an open channel — the foundation of HTTPS and modern internet security.

⚡Security relies on the hardness of integer factorization — vulnerable to Shor's algorithm
Skip to ECC →
1985Quantum Threatened

ECC

Elliptic Curves and the Mobile Era

05

Elliptic Curve Cryptography achieves the same security as RSA with much smaller keys — crucial for mobile devices, TLS, and Bitcoin's digital signatures.

⚡256-bit ECC ≈ 3072-bit RSA in security — also vulnerable to quantum computers
Skip to Post-Quantum →
2024+Quantum Safe

Post-Quantum

We Are Here — Preparing for Q-Day

06

NIST standardized CRYSTALS-Kyber and CRYSTALS-Dilithium in 2024. These lattice-based algorithms resist attacks from quantum computers. The race to migrate begins now.

⚡Lattice problems: even Shor's algorithm cannot break them efficiently

End of Timeline

The story continues — quantum computing evolves every day. The race to migrate begins now.

TechBi Labs · 2026