>> NARRATOR: Caesar altered his alphabet, the Nazis had Enigma, computers and digital encryption. The attempts to make and break these secret methods of scrambled communication have changed the course of history. Now, "Codes" on<i> Modern Marvels.</i> <font color="#FFFF00"> [Captioning sponsored by</font> <font color="#FFFF00"> A&E TELEVISION NETWORKS]</font> >> NARRATOR: Manila, the Philippines, January 6, 1995. When police responded to an apartment fire, they found a Toshiba laptop amid a batch of chemicals and bomb-making materials. An open file on the laptop revealed a plan to simultaneously bomb 12 U.S. airliners over the Pacific. The potential death toll-- 4,000 passengers. Several other files used encryption software that scrambled the writings in secret code. The Philippine police decoded some of the files using a special computer program and uncovered a list of bomb-making recipes. All the evidence pointed to the most hunted terrorist in the world: Ramzi Yousef-- wanted for his involvement in the World Trade Center bombing. Yousef's plots were stopped and he was in U.S. custody within six weeks. It was a major victory for international law enforcement and revealed the importance of cryptology-- the science of making and breaking secret codes. To trace the development of codes is to uncover the very fabric of civilization. Once a culture reaches a level of sophistication in literacy, science and language, the demand for secret symbolic communication flourishes. >> DAVID HATCH: I think codes go back probably as far as there is language. People had something to keep secret. They needed to find some way to scramble it. >> NARRATOR: For centuries, codes have been controlled by governments employed in war, applied in diplomacy and used in espionage, but with modern technology, the use of codes by individuals has exploded, enriching cryptology and powering citizens. A communications boom has heightened the need for codes to keep the information private on the Internet, at ATMs and in medical offices. Today's complex codes are the result of a historic seesaw battle between codemakers and codebreakers that has pushed the very boundaries of science. The earliest known code was an inscription carved into a rock by an Egyptian scribe in 1900 BC. It was an attempt to demonstrate wider knowledge by dressing up the writing. Ordinary hieroglyphics were replaced with unusual symbols which told the story of the writer's master, Khnumhotep II. Another early code was used for secrecy. A tiny enciphered tablet found on the banks of the Tigris River dating from 1500 BC contained a hidden formula for glazing pottery, and the ancient Greeks created their own inventive coding methods. >> DAVID KAHN: One of the subordinates of a Persian monarch thought that it might be time to revolt, and he had an agent in the court of Darius the Great, and this agent sent a message to this man saying it's now time to revolt. He shaved the head of one of his slaves, and tattooed on the head the word "revolt," and waited for the hair to grow and sent the slave down to this man's palace. When the man got the slave, he shaved the head, saw the word "revolt" and realized that this was the time, and he did revolt successfully. >> NARRATOR: In Sparta, a new instrument to encipher messages between legions was used. It was called a skytale. >> HATCH: A cloth was wrapped around a stick and the message written down the side. Wrapped around the stick, the message could be read. Unwrapped, it was scrambled. The message was sent from general to general unwrapped. The generals would have a stick of the appropriate length, could wrap the cloth around it and read the message. >> NARRATOR: Every code had a key, a secret method of scrambling and unscrambling messages used by sender and receiver. Julius Caesar enciphered his military communications using a key that employed an alternative alphabet by moving each letter three spaces to the right, but with the collapse of the Roman Empire in 500 AD, European cryptology entered a dark age that would last for a thousand years. But another civilization was rising in the east. By 900 AD, Arab society was one of the most literate cultures in the world and the study of codes flourished. The Arabs were the first to record the methods of transposition-- the scrambling of letters-- as well as substitution-- the replacement of letters with numbers and symbols. They were the first to outline specific techniques of codebreaking that involved mathematical or frequency analysis. >> KAHN: The Arabs were very interested in letter studies, and they counted the number of times a character, such as aleph, appeared in the<i> Koran</i> and they discovered which letters began words frequently. They used this information, a statistical source, to learn how to break codes. The most frequent coded letter represents the most frequent plaintext letter, and that's how you begin to solve a code, and they were the first to do this. >> NARRATOR: With the Renaissance, cryptology had a rebirth in Europe. In 1466, an Italian arect, Leon Alberti, veloped the greatest cologicnven in a thousand years at the urging of the Vatican. It was a system of rotating cipher disks with two rings of letters and several numbers. By scrambling so many letters randomly, it was the first to challenge the Arab codebreaking method of frequency analysis. >> KAHN: Previous systems just replaced "A" with "D" only one at a time. The Alberti cipher disk used a disk in which these letter combinations could be changed from time to time, and as a consequence, "A" would be represented not by only one letter, but by many letters. This was called poly-alphabetic-- many alphabet-- substitution, and it was the basis for many modern cipher systems. >> NARRATOR: A French diplomat, Blaise de Vigenere, improved the Alberti system in 1586 by creating a grid of 26 cipher alphabets, each shifted one over from the last. By use of a keyword, encoding and decoding communications using Vigenere's square could be calculated on a sheet of paper instead of having to carry a disk. Unfortunately, Mary, Queen of Scots did not employ this new development. Beginning in 1568, Mary was imprisoned by her cousin, Queen Elizabeth I of England. In 1586, a group of Catholics sought to rescue Mary and put her on England's throne after assassinating Elizabeth. Her rescuers communicated with Mary through secret coded letters. >> HATCH: Her great mistake was in thinking that her cipher system was secure. It was actually being read by Queen Elizabeth's codebreakers and everything about the plot was known, and when it reached a certain critical point, Queen Elizabeth called a halt to it and sentenced Mary Queen of Scots to death. >> NARRATOR: By the 1700s, each European power had its own "black chamber," a nerve center for deciphering messages and gathering intelligence, but the real revolution in cryptology was just ahead. >> HATCH: Telegraph, for the first time, made it possible to send messages quickly over long distances. In fact, it made the United States a continental power by increasing its communications power. It also raised the necessity for cryptology. >> NARRATOR: In 1844, Samuel Morse invented Morse code, a series of electrical dots and dashes to communicate over the telegraph. Because the code was public and messages could be easily intercepted, the need for new secret codes became acute, but the telegraph paled in comparison to the communication industry's next scientific development-- one that revolutionized codes and was used with murderous impact in the 20th Century. At the dawn of the 20th Century, an Italian physicist, Guglielmo Marconi, changed the world of codes forever. Marconi's invention harnessed radio waves as a new method of communication. The result was an instantaneous transmission of messages across long distances. >> KAHN: The invention of the radio was the most important single event in the history of codes and ciphers. Radio had the great effect of facilitating communications. You don't have to lay wire or anything like that-- you can just go out with a radio post and communicate-- but it has the great disadvantage of turning over to the enemy every message that you send, so this means you have to put into code every message that you send, so it stimulated enormously the great growth of codes and ciphers. >> NARRATOR: The ramifications of this new invention were not lost upon the generals. Radio allowed quick communication with field divisions and a more rapid, mobile form of warfare. Radio messages were enciphered and sent in Morse code across the airwaves... But radio transmission revealed every cryptogram it conveyed. It furnished a constant and massive stream of intercepts to the enemy. With the outbreak of World War I, the need for new codes and codebreakers sharply escalated. A global battle of secret communications had begun. On August 5, 1914, British divers from the ship<i> Telconia</i> severed German cable lines in the North Atlantic. >> STEPHEN BUDIANSKY: It appears their idea was simply to make things more difficult for the Germans, but it had the payoff of forcing a great deal of traffic that would have gone by cable onto radio, and so it resulted in really a flood of intercepts coming in that otherwise wouldn't have been available. >> NARRATOR: Once intercepted, messages were sent to Room 40, the cryptanalysis section of the British Admiralty. >> HATCH: Room 40 might be the prototype of modern cryptanalytic organizations. They recruited mathematicians, linguists, chess masters-- anybody who was good at puzzle-solving. >> NARRATOR: In September 1914, Britain received one of the greatest gifts in the history of cryptology. Her allies, the Russians, captured the German cruiser <i> Magdeburg</i> in the Baltic and a book of Germany's main naval code. They promptly turned the codebook over to Room 40, allowing Britain to break German naval messages and bottle up Germany's battleships for the duration of the war. Codebreaking had transformed modern combat. >> BUDIANSKY: Being able to read the German naval signals, often almost instantaneously, was something that simply hadn't happened before in warfare. >> NARRATOR: On the Eastern front, cryptography or lack of it, led to one of the most critical battles in World War I. In late August 1914, the Russians sent two armies into East Prussia in a pincer movement to trap the Germans near the village of Tannenburg. The Germans were outmanned, but had the advantage of listening in on Russian radio communications. Due to the Russians' rudimentary and disorganized coding system, intercepts told the Germans that the Russians' southern army was moving faster than its northern force. The Germans wheeled and destroyed the Russian southern army, capturing 100,000 prisoners, with an estimated 30,000 dead or missing. >> KAHN: This was the first great defeat of the Russians in the war, and it started them on their long slide into ruin and revolution. The Russians did not, at World War I, have a good cipher system, and in part, they lost the war because of it. >> NARRATOR: But the greatest codebreaking event in the history of cryptology began on January 17, 1917. The British intercepted a telegram that was encrypted with the highest German diplomatic code, 0075. It was a mind-numbing system of 10,000 words and phrases attached to a thousand numerical code groups. The secret message was from the German foreign minister, Arthur Zimmermann to his ambassador in Washington, Johann Von Bernstorff, for relay to Germany's ambassador to Mexico, Heinrich Von Eckhardt. The telegram would be deciphered there and sent to Mexico's president, Venustiano Carranza. >> HATCH: It was sent from Berlin to Washington, encrypted, on the American undersea telegraph cable. The British intercepted it there; recognized its importance. It was in a new diplomatic system which the British had not yet broken. >> NARRATOR: After receiving the message in the new 0075 code, Von Bernstorff's office in Washington then made a fatal mistake. >> HATCH: In Washington, they took this telegram out of the new diplomatic codebook, re-encrypted it in the old diplomatic codebook, and sent it to Mexico City on the telegraph. >> NARRATOR: But the British had already broken the old code. >> HATCH: The British intercepted that version as well, had versions to compare-- perhaps the silliest, most tragic error that a cryptographer can make. >> NARRATOR: British cryptanalysts began to decipher the message in the old code, in painstaking chunks, constructing patterns using pencil and paper. Within days, they had it. As the meaning of Zimmermann's secret message began to emerge, the import was stunning. Despite the loss of American lives when Germany sank the British ocean liner<i> Lusitania,</i> America had maintained its neutrality, based on Germany's subsequent restrictions on its U-boats. The Zimmermann telegram outlined Germany's intent to resume unrestricted submarine warfare on February 1, 1917, as a means to strangle Britain. To keep America at bay, Zimmermann proposed that Mexico invade the United States and reclaim Texas, New Mexico and Arizona. Germany also asked Mexico to persuade Japan to attack America. The actions would be backed with German military and financial aid. The British Admiralty was desperate to get the deciphered message to the Americans without alerting the Germans that their code had been broken. A British agent was able to infiltrate the Mexican telegraph office and retrieve a deciphered copy of the message to Mexico's president. Once they had their cover of a supposed leak in Mexico, the British approached the Americans and revealed the telegram. >> KAHN: The whole country blew up. Everybody was incensed. Formerly, only the East Coast was concerned. Now, suddenly, the whole Midwest was worried about Mexico, and six weeks after this message was deciphered, the United States declared war on Germany. So it was probably the most significant event in codebreaking history and certainly in intelligence history. >> HATCH: What the Zimmermann telegram did was convince the entire country that Germany was a national enemy, and a few months later, when Woodrow Wilson asked for a declaration of war, he had a united and angry country behind him ready to go to war against the Germans. >> NARRATOR: A single breakthrough by the cryptanalysts in Room 40 had succeeded where three years of intensive diplomacy had failed. Codebreaking would play an even greater role in cryptology's golden age: World War II. At the end of World War I, the power of the codebreakers over the codemakers seemed obvious, but by 1917, American inventor Edward Hebern conceived the first model of an electrical machine made with a wired rotor of letters attached to a keyboard. One year later, a German electrical engineer, Artur Scherbius, independently created an electrical encryption machine similar to Hebern's, with several rotors. The inventions revolutionized cryptography by mechanizing the production of codes with millions of potential variations. >> KAHN: Imagine a hockey puck, 26 electrical contacts on one side, 26 electrical contacts on the other side, wired at random. You shoot an electrical current through... into "A." It comes out at "Q," lights up a letter. Now this hockey puck turns one space. You shoot a current in again at "A." Now it's going to come out at "X." And this continues to turn until you go through all 26 revolutions. And then, instead of just having one cipher machine, one cipher wheel next to another, you have several rotors next to another. >> NARRATOR: By the mid-1920s, Scherbius was mass-producing his new model, called Enigma. Over the next two decades, he would sell more than 30,000 units to the German military that viewed it as a godsend. Meanwhile, the cryptology offices of the Allies had dwindled in personnel and quality, but Poland, because of its geographical vulnerability between Germany and Russia, was desperate for intelligence. The Poles set up a world-leading cryptanalyst bureau, and hired a group of brilliant mathematicians. One of them was 23-year-old Marian Rejewski. >> BUDIANSKY: What Rejewski realized was that if you have a machine that's based on rotors, there's certain mathematical relationships between the way it enciphers a letter in one position, and the way it enciphers a letter in the next position in sequence. Even today it's an astonishing accomplishment of what he did-- was able to reconstruct the wiring of the rotors of an Enigma machine without ever having seeing one. >> NARRATOR: In building his own model of the German military Enigma, all Rejewski had was a commercial version of Enigma and his extraordinary math skills. At the time, only a few hundred German military Enigma units existed, and all were kept under tight control by the German Army. Then, in 1931, a German traitor, Hans Thilo-Schmidt, supplied background information for using the Enigma machine which aided Rejewski's guesswork. >> BUDIANSKY: The one piece of the puzzle he did not have was knowing how the keyboard of the Enigma machine was wired up to the first rotor. Maybe he had a good sense of the lack of imagination of the Germans, but he thought, well, maybe they wired "A" to "A" and "B" to "B" and "C" to "C" and sure enough, that was it. He tried that, and he said the solutions started coming out as if by magic, almost, on this paper in front of him. >> NARRATOR: But the Germans routinely changed the daily key-- the indicator setting that determined the scrambling of their daily messages. The daily key was distributed in a monthly codebook to both sender and receiver to code and decode messages. To find the daily key, Rejewski built and connected replicas of six Enigma machines together that ran through more than 17,000 indicator settings. He called his new contraption the "Bombe" because of its ticking noise while running the permutations. >> KAHN: Codemaking had been mechanized with the cipher machines-- the Enigma-- and now what the Poles were doing, after mathematizing their codebreaking, was carrying it the next step further and mechanizing the mathematized codebreaking. >> HATCH: It was a great insight when they invented it-- a machine to solve a machine. >> NARRATOR: The Poles secretly read the Enigma traffic for several years until they hit a huge obstacle in December, 1938, when the Germans added two new rotors into the rotation. This exponentially increased the need for more bombes and cryptanalysts to run through the daily settings. Fearing a German invasion, the Poles finally called in their allies, Britain and France. In a small brick hut in the Pyry forest south of Warsaw, the Poles revealed their astounding discoveries. >> KAHN: And at the proper moment, they stripped away these cloths, they pulled them off, and there in front of the astonished eyes of the British and the French codebreakers were replicas of German Enigma machines. >> NARRATOR: The British were able to smuggle out the machines two weeks before Hitler invaded Poland. They went straight to the government's code and cipher school, otherwise known as Bletchley Park, an ornate mansion 50 miles north of London. Alan Turing, a math genius recruited to Bletchley from Cambridge, soon made a fundamental insight into the workings of the bombes. >> HATCH: The original Polish bombe would just keep sorting through German military messages until it came upon a key word. >> KAHN: Alan Turing realized that there were so many possibilities in the German Enigma machine that they couldn't run through them all, and he had a different approach, and he devised a machine which would eliminate most of the possibilities, leaving relatively few to be tested. >> NARRATOR: Each of Turing's bombes had 180 rotors that clicked round letter by letter-- 20 every second-- until they hit the correct one. By this time, Bletchley was filled with hundreds of codebreakers who were divided into huts, and labored in shifts to solve the flood of incoming messages. >> ARTHUR LEVENSON: Full meritocracy and, uh... rank didn't matter a hoot, and if a guy was good, regardless of what rank, he was given a free hand. >> BUDIANSKY: It requires a certain almost contradictory combination of talents: on the one hand, this ability to deal with detail, but at the same time, this ability to a achieve this almost sort of illogical leaps of insight and intuition. Um, it almost is that you wanted, you know, Beethoven with the soul of an accountant. >> NARRATOR: Soon Britain was deciphering large numbers of the German Enigma communications. In 1943, a British engineer, Tommy Flowers, created "Colossus," a mechanism that moved codebreaking from electromechanical to purely electronic, which worked much faster. It read Germany's most complex coding system-- the 12-rotor Lorenz machine used by Germany's top commanders including Hitler. Colossus was a proto-computer capable of reading paper tape at 5,000 characters a second. The Allied breaking of the German codes played a key role in such victories as the Battle of the Atlantic, the war in North Africa and D-Day. Allied codebreaking shortened the war, saved millions of lives and highlighted the power of brains over bullets. It also launched the computer age. But there was another coding system used by the Japanese in World War II that the Americans were just as determined to crack. At the close of World War I, American cryptology was rudimentary, but since the early 1920s, a lone genius, William Friedman, had been developing statistical methods to solve the codes of the new rotor machines while heading the U.S. Signal Corps. When Japan switched to a mechanized coding system in the mid-1930s, Friedman's team of codebreakers was soon reading Japan's new Red code for diplomatic communications, but solving Japan's codes was a torturous process. >> KAHN: When you're trying to solve a code, you come in every day and look at an inscrutable bunch of letters or numbers-- it's anguish... "Maybe we should try this, maybe we should try that." Day after day, month after month, year after year sometimes, until finally, new messages come in which allow you to see some kind of pattern which you hadn't seen before. >> NARRATOR: Then, in February 1939, Japan introduced the "Purple" machine-- a mind- twisting coding system that employed several rotors and telephone switches, but Japan then made a critical human error, an important factor in codebreaking throughout history. >> HATCH: The Japanese helped out by sending the same messages in the Red and Purple systems. This allowed Americans to compare the two systems and make some breaks. >> NARRATOR: A young MIT electrical engineer in Friedman's group, Leo Rosen, built a machine to simulate Purple's complex scrambling patterns. By 1940, the contraption had automated the decipherment of the Japanese Purple code. >> HATCH: It was a great intellectual accomplishment. It made the decryption of these Japanese messages almost automatic. It sometimes would allow the Americans to read the Japanese ambassador's mail before he did. >> NARRATOR: The Purple code breakthrough led to one of the greatest intelligence coups of the war. Tokyo's ambassador to Berlin, Hiroshi Oshima, made a front- line tour of Germany's defenses in Normandy in 1943. He then transmitted a lengthy description back to Japan in the Purple code. >> BUDIANSKY: He describes in incredible detail, I mean, down to the caliber of the weapons, in the German fortifications, the dimensions of the antitank ditches, where mine fields were-- it was really a gold mine. >> NARRATOR: The solved message was soon on General Eisenhower's desk. He used it to plan the D-Day invasion of France that was launched six months later. Though Purple had been cracked, America still worked desperately to solve the JN-25B code-- Japan's secret naval communications. Joseph Rochefort, a long-time cryptanalyst fluent in Japanese, led the effort in Station Hypo, the Navy's codebreaking branch in Hawaii. By March 1942, after years of excruciating work, JN-25B was broken. On May 14, a Japanese message was decoded outlining a huge invasion force heading to "AF." Rochefort and Admiral Chester Nimitz immediately believed "AF" was Midway, one of America's key outposts in the Pacific, but Washington believed it was the Aleutian Islands. >> BUDIANSKY: Really, it was to shut up the doubters in Washington that Rochefort, um, carried out what's now this famous stunt of having a message sent to Midway, ordering them to send a message announcing that their desalination plant had broken, and then a few days later, a JN-25 message was broken in which the Japanese said that they had intercepted this American message saying that "AF" was short of water. This really dotted the "I" and crossed the "T." >> NARRATOR: The invasion of Midway was the grand plan of Isoroku Yamamoto, Japan's legendary naval commander. The intent was to take over the island, draw out the remaining American fleet from Pearl Harbor, and destroy it with a surprise attack. On June 4, 1942, the Japanese began to attack Midway, but lurking on the horizon were the coiled forces of the U.S. Navy. >> BUDIANSKY: Knowing in advance what the Japanese plans were allowed Nimitz to get his carriers there first and essentially to surprise the Japanese. >> KAHN: We knew where the Japanese fleet was coming. We were able to hover off their flank, and unsuspecting of the Japanese, hurl ourselves on the Japanese, sink four carriers and send the Japanese battleships and carriers reeling back to Japan. >> BUDIANSKY: That knowledge not only was the turning point for the Battle of Midway, but the Battle of Midway was the turning point in the entire Pacific war. >> NARRATOR: It was a stunning and flawless operation. And in another part of the Pacific, the Americans were launching one of their own codes, one that would never be broken in World War II. Philip Johnston, a retired engineer living in Los Angeles, proposed using the Navajo language to the Marines in 1942. Johnston grew up on a Navajo reservation and was fluent in its complex forms of conjugation, sounds and structure. It was remote-- only about 30 white Americans could speak it. No German, Japanese or Italian had ever studied it. The Navajo were also one of America's largest tribes with a potentially huge pool of codetalkers. >> DR. SAMUEL BILLISON: We used the, uh... what we call a phonetic alphabet, so we use it by sound. It's a nasal sounds and guttural sounds and interchangeable. >> NARRATOR: Within weeks of hearing Johnston's idea, the Marines were training 29 Navajo codetalkers near San Diego. To avoid confusion, many Navajo words from the natural world were used to indicate specific military terms. >> BILLISON: <i> Chetavaji</i> in Navajo is "turtle," and when you send a message and say <i> chetavaji</i> on the radio, the receiver writes down "tanks," t-a-n-k-s. >> NARRATOR: By August, 1942, the first group of Navajo codetalkers saw action during the invasion of Guadalcanal. By the end of the year, an additional 83 codetalkers were serving in all six Marine Corps divisions. >> KAHN: If you wanted to communicate a written message securely, you had to type it out or write it out. You had to give it to a code guy. Now, this could take an hour or several hours. With the Navajo code guys, it was instantaneous. >> NARRATOR: The Navajo spoke directly over the radio, sending and receiving battlefield communications from both field headquarters and from the front lines in their native language. >> BILLISON: When you send a Navajo code, the receiver gets it, gives it to the commanding officer. That's how fast it was-- two minutes against two hours. >> NARRATOR: In the attack on Iwo Jima, the Navajo codetalkers sent more than 800 top secret battlefield communications-- all without error. By war's end, there were 420 Navajo codetalkers. After the war, the U.S. government forbade them to talk of their unique contributions because of the secrecy of their code. Only in 1968 was the Navajo code made public, and in 1982, the codetalkers were finally honored with a special commemoration day. >> KAHN: America owes the Navajo codetalkers the lives of many of its sons. >> NARRATOR: The greatest tribute was that their code was never broken, but for codemakers, the hunt for a truly unbreakable code is an obsession that continues into the age of computers. For centuries, governments had controlled cryptology. That would change with the modern age. Soon after World War II, computers began to create codes of almost infinite complexity. >> KAHN: There's a rule of thumb in cryptography. If you double the number of combinations that the code makes, you have to square the number of combinations that the codebreaker has to try. So one guy is going from five to ten, but the codebreaker has to go from five to 25. It's much easier to make the number of combinations virtually impossible to test. >> NARRATOR: But this new encryption was still only accessible to the government. In 1952, President Harry Truman founded the National Security Agency, the greatest collection of computer and cryptologic talent in the world. Its charge was to intercept and decrypt intelligence from all over the globe. By the 1970s, more businesses began using computers to encrypt communications, but distributing secret keys needed to encode and decode messages remained cryptology's greatest historical problem. Businesses had to physically fly couriers to dozens of distant offices to deliver the secret keys to avoid interception and to ensure absolute security, but key distribution was not cryptology's only problem. By the 1970s, some people were concerned about the growing codebreaking power of the government because of computer technology. >> PHIL ZIMMERMANN: I think the biggest threat to privacy that we face is Moore's Law: it's the power of computing doubling every 18 months. The human population is not doubling every 18 months, but the ability for computers to keep track of us is. Surveillance technology with computers behind them to analyze the surveillance data can give rise to an omniscient government, and it's not clear that democracy can survive omniscience. >> NARRATOR: by the mid-1970s, a trio of Stanford cryptographers, Whitfield Diffie, Martin Hellman and Ralph Merckle, created a theoretical model for coded computer communications that eliminated the need for a secret distribution of keys. It also sought to offer powerful digital encryption to a perceived future of mass computer users as a counterweight to government spying. Called "public key cryptography," it gave each computer user a pair of different but related keys, one public and one private. Now, say Bob wants to send a secret message to Alice. Bob would use Alice's public key for encoding, but only Alice could use her private key to decode the message. No physical transportation of secret keys, and now even Bob and Alice could theoretically have access to encrypted communications hidden from the most powerful investigative forces in government-- complete privacy. >> KAHN: None of the other developments in cryptography that I have seen, from the beginning of codes and ciphers themselves, has had the impact or has been as original a concept in cryptography as Whitfield Diffie's invention of public key cryptography. >> NARRATOR: Within a year, three MIT researchers, Ronald Rivest, Adi Shamir and Leonard Adleman created a series of mathematical equations using prime numbers that made Diffie's theory practical. As a side note, a group of three scientists, James Ellis, Malcolm Williamson and Clifford Cox, working for Britain's government communications headquarters, apparently independently invented public key cryptography by the mid- 1970s just before Whitfield Diffie. Their work was classified and it wasn't until 1997 that public acknowledgment of their feat was recognized. As for the three MIT inventors, they formed RSA Data Security in 1982, the first company to commercialize public key cryptography and launch secure e-commerce. >> Adleman: The market we were going after in 1982 was the Internet market, okay? But we were so premature because it was to be 15 years later that the Worldwide Web took off. >> NARRATOR: But the National Security Agency did notice and desperately tried to stop the spread of public cryptography. In 1986, the government stopped Lotus Development from exporting its software because it included RSA encryption. Then, in 1993, the government investigated Phil Zimmermann for creating and distributing "Pretty Good Privacy," a software that used RSA encryption over the Internet. PGP could be used on anybody's personal computer instead of just the giant machines used by the government and businesses. >> ZIMMERMANN: There was a time when NSA held a monopoly on this kind of technology, but over the past 20 years, that monopoly has eroded and now academic cryptography has reached parity with the NSA, and PGP uses the best of the academic cryptographic algorithms and has made it available to the masses. >> NARRATOR: The National Security Agency was terrified that criminals were now accessing the world's most powerful unbreakable encryption. The NSA believed PGP was severely compromising its codebreaking and intelligence- gathering abilities. >> ZIMMERMANN: Many times I've been worried about if criminals and terrorists were to use this technology, and I did a lot of soul-searching on it. I sometimes lost sleep thinking about it, but individual governments like Stalin or Hitler have killed more people than all of the criminals of the 20th Century combined, all over the world. >> NARRATOR: By 1994, RSA encryption was widely used in most U.S. software, and companies were pushing to export it. The government urgently sought a compromise by introducing the "Clipper chip," a government chip that would be installed in communications devices. The chip, like a wiretap, could only be accessed by the government through a court order. Law enforcement could still eavesdrop on suspected criminals, but grant the public a level of privacy. >> DOROTHY DENNING: People were concerned that it was voluntary to start out with, but that it would become mandatory, that it would be pushed upon them. They were concerned about loss of personal privacy. >> Adleman: Do you want to control your private communication just by yourself, or do you want to be partners with the government in controlling your private communication? And ultimately, uh, society has decided that we want to keep privacy to ourselves. >> NARRATOR: After a five-year fight and a huge public backlash to the proposal, the Clinton administration granted businesses the right to export public cryptography. By 1996, after MIT had published PGP in a book and posted it on its website, the government backed off its investigation of Zimmermann. >> KAHN: Even though government has intruded increasingly into private lives and has greater capacities these days to intercept communications, the growth of encryption has made it possible for individuals to protect themselves and protect their privacy in a way that had never been able to be done before. >> ADLEMAN: You know, historically there's been a battle between cryptographers who make the codes and cryptanalysts who break the codes. Edgar Allen Poe once said that "Any code a man can invent, another man can break," but it turns out that that's probably incorrect. The best mathematical evidence we have is that that's not the case, that, in fact, codemakers do win over codebreakers. >> KAHN: Codebreaking will last as long as people make mistakes, but the code systems themselves are getting better and better. They can't be broken now if properly used, so I think we're in an era of the slow death of the codebreaker, much as I regret it in a way, and increasingly in the era of the codemaker. >> NARRATOR: But throughout history, new codes have always been declared unbreakable, only to be eventually broken. As codes enter the realm of quantum computers, human ingenuity well be tested once again. Only time will tell the victors. <font color="#FFFF00"> [Captioning sponsored by</font> <font color="#FFFF00"> A&E TELEVISION NETWORKS</font> Captioned by <font color="#FF0000"> The Caption Center</font> WGBH Educational Foundation]