The Smart Encryption Procedures and Policies
By Milica D. Djekic
The need to hide the message from your opponent would exist since the beginning of the ancient time.
With the first countries and the rise of human activities and progress through the history – the people
would feel the need to camouflage what they really know in order to take advantage over such findings.
Many folks would believe that the cryptography would come with the first electronics and digital systems,
but that’s not the fact for a reason so many cryptographers would work in the past trying to protect
someone’s interests and infrastructure, so far. Through the previous times, there would be a lot of army
or rulers’ couriers who would take the messages from one place to another and once they come to the
certain destination – they would put those pieces of information into the hands of so skillful encryption
staffs. Also, you could try to imagine how knowledgeable the people in the past were for a reason they
would perfectly know how to develop some cryptosystem on the piece of paper or the part of skin and
explain to the origin and destination forces how to prepare and decrypt their secret contents. The point
is so many armies, law enforcement and military officers through the past times would so carefully go
through so useful training and learn the secrets of the good crypto-protection. Also, there would always
be the people who would so elegantly play with the mathematics and the beginnings of the engineering
and who would get capable to invent the new and new cryptosystems that would be the good enough to
offer some kind of advantage to their countries, militant groups or the overall communities. So, the history
of cryptography is so huge and maybe even today we can talk about some smart encryption and the fact
is that sort of benefit would be present, so far – but we should get that the smart cryptography is not only
the product of this time and so many competitors even in the ancient time would believe for themselves