Get the world’s most fascinating discoveries delivered straight to your inbox.
You are now subscribed
Your newsletter sign-up was successful
Want to add more newsletters?
Delivered Daily
Daily Newsletter
Sign up for the latest discoveries, groundbreaking research and fascinating breakthroughs that impact you and the wider world direct to your inbox.
Once a week
Life's Little Mysteries
Feed your curiosity with an exclusive mystery every week, solved with science and delivered direct to your inbox before it's seen anywhere else.
Once a week
How It Works
Sign up to our free science & technology newsletter for your weekly fix of fascinating articles, quick quizzes, amazing images, and more
Delivered daily
Space.com Newsletter
Breaking space news, the latest updates on rocket launches, skywatching events and more!
Once a month
Watch This Space
Sign up to our monthly entertainment newsletter to keep up with all our coverage of the latest sci-fi and space movies, tv shows, games and books.
Once a week
Night Sky This Week
Discover this week's must-see night sky events, moon phases, and stunning astrophotos. Sign up for our skywatching newsletter and explore the universe with us!
Join the club
Get full access to premium articles, exclusive features and a growing list of member rewards.
The pioneers of the most widely-used encryption scheme on the Internet were honored yesterday with the most prestigious award in computer science.
Whitfield Diffie, the former chief security officer at Sun Microsystems, and Martin E. Hellman, a professor emeritus at Stanford University in California, on Tuesday (March 1) received the $1 million cash prize that goes with the A.M. Turing Award, which is bestowed by the Association for Computing Machinery.
The award, named after the brilliant British computer scientist Alan Turing, who used cryptography to crack the German Enigma ciphers during World War II, is often called the Nobel Prize of computing.
"Today, the subject of encryption dominates the media, is viewed as a matter of national security, impacts government-private sector relations, and attracts billions of dollars in research and development," Alexander Wolf, the Association for Computing Machinery president, said in a statement. "In 1976, Diffie and Hellman imagined a future where people would regularly communicate through electronic networks and be vulnerable to having their communications stolen or altered. Now, after nearly 40 years, we see that their forecasts were remarkably prescient." [6 Incredible Spy Technologies That Are Real]
Cryptography allows two parties to communicate privately, knowing that any third party who tried to "eavesdrop" would be detected. For nearly as long as people have been sending secret messages, spies and military leaders have devised means to scramble those messages. For instance, the ancient Spartans used a baton wrapped with strips of paper, called a scytale, to encode secret military messages passed between commanders. Only those who had the right size baton could decode the messages.
The simplest types of cryptography typically involve substituting one letter for another, but by the turn of the 20th century, radios, along with new applications that involved sophisticated machining and electricity, enabled people to dream up ever-more complex cryptography systems. Enciphering machines became central to the war effort by World War II.
Secure keys
Get the world’s most fascinating discoveries delivered straight to your inbox.
Whether it's a baton of the same size or a secret decoder ring, the parties who are trying to communicate both need a "key" to send and decipher a scrambled message. However, there are problems with using identical keys on both ends, a system called symmetric encryption. For instance, if people get too reliant on one key, that may provide enough of the encrypted text for an opponent to crack the code. However, having many separate keys for different lines of communication can be a headache to manage.
But in their 1976 paper, titled "New Directions in Cryptography," Diffie and Hellman developed the conceptual framework for an asymmetric encryption scheme. In their system, a public, freely available key is used to encrypt messages, while a private key is used to decode messages. The private key is derived from the public key, yet to deduce one from the other is simply computationally unrealistic.
This public-private key system is the heart of the secure Web: Any website with a URL that starts with "https://" is relying on this method, called the Secure Transport Layer. The method is now used by billions of people every year for wide-ranging applications such as e-commerce, email servers and cloud computing systems.
"Public-key cryptography is fundamental for our industry," Andrei Broder, a distinguished scientist at Google, said in the statement. "The ability to protect private data rests on protocols for confirming an owner's identity and for ensuring the integrity and confidentiality of communications. These widely used protocols were made possible through the ideas and methods pioneered by Diffie and Hellman."
Follow Tia Ghose on Twitter and Google+. Follow Live Science @livescience, Facebook & Google+. Original article on Live Science.

Tia is the editor-in-chief (premium) and was formerly managing editor and senior writer for Live Science. Her work has appeared in Scientific American, Wired.com, Science News and other outlets. She holds a master's degree in bioengineering from the University of Washington, a graduate certificate in science writing from UC Santa Cruz and a bachelor's degree in mechanical engineering from the University of Texas at Austin. Tia was part of a team at the Milwaukee Journal Sentinel that published the Empty Cradles series on preterm births, which won multiple awards, including the 2012 Casey Medal for Meritorious Journalism.
