Skip to main content

Cryptography Collection

Cryptography, the art of secret communication, has a rich history intertwined with brilliant minds and groundbreaking inventions

Background imageCryptography Collection: Alan Turing, British mathematician

Alan Turing, British mathematician
Alan Turing. Caricature of the British mathematician Alan Turing (1912-54). In 1937 Turing described a theoretical computer (a Turing machine) in rigorous mathematical terms

Background imageCryptography Collection: The first grid, 1951, by the cryptographer Michael Ventris in his ultimately successful efforts to

The first grid, 1951, by the cryptographer Michael Ventris in his ultimately successful efforts to decipher Minoan
CRYPTOGRAPHY, 1951. The first grid, 1951, by the cryptographer Michael Ventris in his ultimately successful efforts to decipher Minoan Linear B script

Background imageCryptography Collection: Quantum cryptography equipment

Quantum cryptography equipment
Quantum cryptography. Eye of an observer reflected in a mirror in quantum cryptography apparatus. Quantum cryptography is based on the principle of entanglement

Background imageCryptography Collection: The Military Enigma I Machine, 1941. Creator: Historic Object

The Military Enigma I Machine, 1941. Creator: Historic Object
The Military Enigma I Machine, 1941. Private Collection

Background imageCryptography Collection: Charles Babbage, caricature C015 / 6701

Charles Babbage, caricature C015 / 6701
Charles Babbage (1791-1871). Caricature of the English mathematician Charles Babbage. Babbage is best known for his pioneering work on programmable computers

Background imageCryptography Collection: Alan Turing, British mathematician

Alan Turing, British mathematician
Alan Turing (1912-54), British mathematician. Turing was educated at Cambridge and Princeton. In 1937 he described a theoretical computer (a Turing machine) in rigorous mathematical terms

Background imageCryptography Collection: Linguistics table, 17th century

Linguistics table, 17th century
Linguistics table. 17th century table titled Tabula Combinatoria. The description at top says that this is a combinatory table showing the most ancient alphabets of the world

Background imageCryptography Collection: John Wallis, 1825 (engraving)

John Wallis, 1825 (engraving)
KW421834 John Wallis, 1825 (engraving) by English School, (19th century); Private Collection; (add.info.: Illustration from Crabbs Historical Dictionary depicting Wallis (1616-1703)

Background imageCryptography Collection: The second grid, 1951, by the cryptographer Michael Ventris in his ultimately successful efforts

The second grid, 1951, by the cryptographer Michael Ventris in his ultimately successful efforts to decipher Minoan
CRYPTOGRAPHY, 1951. The second grid, 1951, by the cryptographer Michael Ventris in his ultimately successful efforts to decipher Minoan Linear B script

Background imageCryptography Collection: Data security, conceptual artwork C016 / 7539

Data security, conceptual artwork C016 / 7539
Data security, conceptual computer artwork

Background imageCryptography Collection: Quantum computing C013 / 6173

Quantum computing C013 / 6173
Quantum computing. Artwork showing a string of data encoded in clusters of qubits, in such a way that quantum computation can be performed on a remote server, while still securely encrypted

Background imageCryptography Collection: The cipher machine SIGABA, developed in the late 1930s and used by the American government for

The cipher machine SIGABA, developed in the late 1930s and used by the American government for the encryption
CRYPTOGRAPHY: SIGABA. The cipher machine SIGABA, developed in the late 1930s and used by the American government for the encryption

Background imageCryptography Collection: Number code, 19th century

Number code, 19th century
Number code. System of semaphore-like symbols used as a code for numbers. A combination of 36 left and right arm and leg positions can be used to encode the numbers from 1 to 9999

Background imageCryptography Collection: Key to science, conceptual image

Key to science, conceptual image
Key to science. Conceptual image of a key, representing research and theories that unlock the mysteries of science

Background imageCryptography Collection: Quantum computer core

Quantum computer core. Crystal core of a quantum computer, as it would appear at high magnification. Quantum computers, which are under development

Background imageCryptography Collection: Sir Francis Walsingham, English statesman

Sir Francis Walsingham, English statesman
Sir Francis Walsingham (1532-1590), English statesman and spymaster. Walsingham was born near Chiselhurst, Kent into an aristocratic family

Background imageCryptography Collection: Giambattista della Porta, Italian scholar

Giambattista della Porta, Italian scholar
Giambattista della Porta (circa 1535-1615), Italian scholar and polymath. Della Porta wrote on a vide variety of subjects, including cryptography, physiognomy, meteorology, optics, astronomy

Background imageCryptography Collection: Leon Battista Alberti, Italian polymath

Leon Battista Alberti, Italian polymath
Leon Battista Alberti (1404-1472), Florentine artist and polymath. Alberti was born at Genoa and educated at Padua. In 1418 he went to Bologna to study law

Background imageCryptography Collection: Johannes Trithemius, German polymath

Johannes Trithemius, German polymath
Johannes Trithemius (1462-1516), German abbot and polymath. Born as Johann Heidenberg at Trittenheim, he studied at Heidelberg

Background imageCryptography Collection: Giambattista della Porta Italian polymath

Giambattista della Porta Italian polymath
Giambattista della Porta (1535-1615), Italian scholar and polymath. Della Porta was born near Naples into a noble family and was tutored by the many learned visitors his father entertained

Background imageCryptography Collection: Security technology, conceptual artwork

Security technology, conceptual artwork
Security technology, conceptual computer artwork. The padlock represents various security technologies, while the printed circuit board (PCB)

Background imageCryptography Collection: Computer hacking, conceptual artwork

Computer hacking, conceptual artwork
Computer hacking, conceptual computer artwork. Computer screens showing rows of numbers and the word " ENTER", represent the use of mathematics, such as cryptology



For sale as Licensed Images

Choose your image, Select your licence and Download the media

Cryptography, the art of secret communication, has a rich history intertwined with brilliant minds and groundbreaking inventions. One such luminary is Alan Turing, the British mathematician whose pioneering work in cryptography during World War II helped crack the infamous Enigma code used by the Germans. His contributions laid the foundation for modern cryptography. In 1951, cryptographer Michael Ventris achieved a remarkable feat by deciphering the Minoan Linear B script using his first grid. This breakthrough shed light on an ancient civilization's language and opened new doors for linguistic exploration. Fast forward to today, where quantum cryptography equipment stands at the forefront of data security. With its ability to harness quantum mechanics principles, this technology ensures unbreakable encryption that even powerful computers cannot unravel. Speaking of which, quantum computer cores are revolutionizing computing capabilities as they possess immense processing power far beyond traditional machines. However, let us not forget historic artifacts like the Military Enigma I Machine from 1941 or Charles Babbage's innovative designs depicted in caricature C015 / 6701. These objects remind us of our cryptographic roots and how far we have come since then. Throughout centuries, great minds like John Wallis in 1825 or linguistics tables from the 17th century have contributed their expertise to advance this field further. Their dedication paved the way for future generations to explore new frontiers in securing information. Conceptual artwork C016 /7539 symbolizes data security—a vital aspect protected through cryptographic techniques—ensuring confidentiality and integrity across various domains. As we delve into cutting-edge technologies like quantum computing (depicted in C013 /6173), it becomes clear that cryptography remains indispensable in safeguarding sensitive information against malicious actors seeking unauthorized access. Finally, let us acknowledge SIGABA—the cipher machine developed during World War II—which played a crucial role in encrypting and decrypting secret messages for American government agencies until well into the mid-20th century.