Official websites use .gov
Secure .gov websites use HTTPS
NSA's Center for Cryptologic History (CCH) and the National Cryptologic Foundation (NCF) co-host the Cryptologic History Symposium. Since 1990, the Cryptologic History Symposium has served as an opportunity to present historical scholarship found in unclassified and declassified cryptologic records and engage in discussion about their significance to history. The event is an occasion for historians and those interested in history to gather for reflection and debate on relevant and important topics from the cryptologic past. Regular speakers include historians from CCH, the Intelligence Community, the defense establishment, the military services, scholars from American and international academic institutions, veterans of the cryptologic profession, graduate and undergraduate students, and noted authors. Past symposia have featured scholarship that set out new ways to consider our cryptologic heritage. The conference provides many opportunities to interact with leading historians and other experts. The mix of practitioners, scholars, and interested observers guarantees a lively debate that promotes an enhanced appreciation for past events. 19th Cryptologic History Symposium – April 30 and May 1, 2025 The Center for Cryptologic History (CH) and the National Cryptologic Foundation (NCF) invite proposals for papers and posters to be presented at the 19th Cryptologic History Symposium on April 30-May 2, 0225. The Symposium will be held in-person at the Johns Hopkins University Applied Physics Lab Kossiakoff Center in Laurel, Maryland on Wednesday, April 30-Thursday, May 1, 2025. Following the Symposium, attendees will be given an opportunity to tour the recently renovated National Cryptologic Museum Library. Questions may be directed to cchevents@nsa.gov The 18th Cryptologic History Symposium “Icons and Innovation” occurred virtually on May 11-12, 2022. Sketchnotes from the following sessions are now available: Session 1: Keynote Address by former DIRNSA, Admiral Bobby R. Inman, USN (retired) Session 2A: Cyber Conflict and Competition: What We Have Learned about Networks and Data as Strategic Risk and Reward Session 4: The Making of "The Last Elephant Cage" Session 6A: Long-Standing Ciphers, New Cryptanalysis Session 7C: Cryptology's Intersection with Diplomacy Session 8C: Explorations of Cryptologic Theories Session 11C: Women in Intelligence: British, Canadian, and American Perspectives Session 12: Concluding Remarks - Cryptologic Icons: Some old, some new