This document summarizes the history of encryption protocols and attacks against them, beginning with the early SSL and TLS protocols in the 1990s. It describes numerous attacks published over the years that exploited vulnerabilities in the protocols, such as padding oracle attacks, timing attacks, traffic analysis attacks, and attacks against specific algorithms like RC4. Each attack paved the way for new, more secure versions of the protocols to be developed. The document outlines advances like TLS 1.1, 1.2, and the removal of insecure or broken algorithms, as well as high-profile security incidents at CAs like DigiNotar and Comodo.