Cryptology as a political instrument

By Matthew Parish, Associate Editor

Friday 1 May 2026

Cryptography is often imagined as a branch of mathematics, an austere discipline of prime numbers and abstract proofs. Yet in practice it is something far more consequential: a political instrument of the first order. States do not merely use cryptography to protect secrets; they shape, regulate and sometimes subvert it in order to exercise power. The history of modern governance may be read, at least in part, as a contest over who may conceal information, who must disclose it, and under what conditions secrecy becomes a public good or a public threat.

The twentieth century revealed cryptography as a weapon of war. The Allied breaking of German codes during the Second World War, most famously at Bletchley Park, demonstrated that secrecy is never absolute; it is always contingent upon the adversaryโ€™s capacity to decipher. The work of figures such as Alan Turing established not merely a technical precedent but a political one. Intelligence superiority became inseparable from computational capability, and states learned that cryptographic strength could determine the fate of nations.

After the war cryptography entered the institutional bloodstream of the state. Organisations such as the National Security Agency in the United States and its counterparts in Europe and the Soviet Union developed vast bureaucracies dedicated to signals intelligence. Here cryptography ceased to be an episodic wartime activity and became a permanent feature of governance. States simultaneously sought to strengthen their own encryption whilst weakening that of others. This duality lies at the heart of cryptography as a political instrument: it is never simply about secrecy, but about asymmetry.

The late twentieth century introduced a new complication. Cryptography escaped the exclusive domain of the state and entered civilian life. The development of public key cryptography, pioneered by figures such as Whitfield Diffie, made it possible for individuals and private entities to secure communications without state mediation. The emergence of the internet transformed encryption from a specialised military tool into a universal necessity for commerce, banking and personal privacy.

States responded ambivalently. Strong encryption underpins modern economic life. Without it electronic commerce would be impossible, financial systems would collapse into mistrust, and the digital economy would cease to function. However encryption obstructs surveillance. It creates spaces beyond the immediate reach of the state, where communications may occur without oversight. This tension gave rise to what became known as the โ€œcrypto warsโ€ of the 1990s, in which governments attempted to impose controls on encryption technologies, including proposals such as the ill-fated Clipper Chip in the United States.

The debate has never truly ended. Instead it has evolved into a more sophisticated contest between secrecy and transparency. States now deploy a repertoire of strategies that extend beyond outright prohibition. They may mandate lawful interception capabilities, require companies to retain data, or compel disclosure under judicial authority. They often promote encryption standards in international fora, thereby shaping the global architecture of digital security in ways that align with their own strategic interests.

The revelations of Edward Snowden in 2013 marked a turning point. They exposed the extent to which intelligence agencies had sought to influence cryptographic standards, sometimes inserting vulnerabilities or exploiting weaknesses in widely used systems. These disclosures altered the political landscape. Encryption ceased to be a technical matter and became a subject of public debate. Trust, once assumed, became contested.

In liberal democracies this contest is often framed as a balance between privacy and security. Yet such a formulation understates the complexity of the issue. Cryptography is not merely a shield for individual rights; it is also an instrument of statecraft. Governments may advocate for strong encryption when it protects their own communications, whilst simultaneously seeking mechanisms to access the communications of others. The same state may, in different contexts, be both a champion of privacy and an adversary of it.

Authoritarian regimes approach the problem differently. For them the priority is not balance, but control. Encryption is tolerated insofar as it does not undermine political authority. Where it does it may be restricted, monitored or criminalised. The result is often a fragmented digital landscape in which different jurisdictions impose incompatible rules, creating what might be termed a geopolitical topology of encryption. Data flows do not simply follow economic logic; they are shaped by legal regimes and political imperatives.

Transparency too is weaponised. States may selectively disclose information in order to legitimise their actions or to delegitimise their adversaries. The publication of intercepted communications for example may serve to expose wrongdoing, justify sanctions or influence public opinion. In such cases, cryptography is inverted: what was once secret becomes public, and the act of disclosure becomes an exercise of power.

The contemporary battlefield of cryptography extends into emerging technologies. The rise of quantum computing threatens to render many existing encryption systems obsolete. States are already investing heavily in quantum-resistant algorithms, recognising that the ability to secure or to break encryption in a post-quantum world may confer decisive strategic advantages. Once again the pattern repeats: technological innovation generates new forms of secrecy, and states compete to control them.

Ukraineโ€™s experience in the present war offers a vivid illustration of these dynamics. Secure communications are essential for military coordination, intelligence sharing and the protection of critical infrastructure. But the open dissemination of information through social media and other channels has become a tool of resilience and international mobilisation. Here secrecy and transparency coexist, each serving distinct but complementary purposes. The state must conceal operational details whilst revealing enough to sustain domestic morale and international support.

Cryptography is not a binary choice between secrecy and openness. It is a spectrum along which states position themselves according to strategic necessity. The management of this spectrum is itself an exercise of power. Decisions about encryption policy are not merely technical; they are deeply political, reflecting assumptions about trust, authority and the role of the state in the lives of its citizens.

One may therefore conclude that cryptography has become a constitutional question of the digital age. It determines the boundaries of state authority, the scope of individual autonomy and the structure of international relations. As technology continues to evolve, so too will the politics of encryption. What remains constant is the underlying principle: information is power, and the ability to conceal or to reveal it is one of the most potent instruments a state possesses.

Cryptography is less about codes than about control. She is the invisible architecture of modern power, shaping not only how states communicate but how they govern, compete and endure.

 

6 Views