← Back to Concept Index

non-secret-encryption

James Ellis's term for a cryptographic method allowing secure message transmission without sharing secret keys beforehand, involving the recipient in the encryption process.

3 chapters across 2 books

Crypto (2001)Steven Levy

Chapter 14

This epilogue chapter recounts the overlooked origins of public key cryptography, focusing on James Ellis, a British GCHQ scientist who, in 1969, conceived the idea of 'Non-Secret Encryption' that allowed secure communication without prior key exchange. Ellis adapted principles from a classified Bell Telephone project to propose a system where the recipient participates in encryption, fundamentally challenging existing cryptographic assumptions and paving the way for secure communications on a vast scale. Despite his groundbreaking insight, Ellis remained unrecognized for decades due to the secretive nature of his work and his eccentric persona.

Chapter 25

The epilogue of 'Crypto' recounts the early history and development of non-secret encryption, highlighting key contributions from the Communications-Electronics Security Group (CESG) and figures such as Clifford Cocks and M. J. Williamson. It situates these advances within a broader historical context involving notable cryptographers like Alan Turing and Claude Shannon, and references seminal works and reports that document the evolution of public key cryptography. The chapter also connects cryptographic developments to espionage narratives and historical accounts, emphasizing the intertwined nature of cryptography, intelligence, and secrecy.

Artificial Life: How Computers Are Transforming Our Understanding of Evolution and the Future of Life (2001)Steven Levy

Chapter 15

This chapter recounts the early, secretive development of public key cryptography by James Ellis at GCHQ, who independently conceived the idea of 'non-secret encryption' that allowed secure communication without prior key exchange. Ellis's work, inspired by a forgotten Bell Telephone analog project, challenged prevailing cryptographic assumptions and laid foundational concepts later popularized by Diffie, Hellman, and Merkle. Despite his breakthrough, Ellis remained unrecognized for decades due to the classified nature of his work and his eccentric personality.