Codes and Cryptography LESSON 1

0.0(0)
studied byStudied by 2 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

Cryptography

method of storing and transmitting data in a particular form.

·        includes techniques such as microdots, merging words with images, and other ways to hide information.

2
New cards

BCE

·        Spartan use of scytale, the Egyptians develop hieroglyphic writing

3
New cards

Egyptians

develop hieroglyphic writing and Notable Roman ciphers such as the Caesar cipher.

4
New cards

Leon Battista Alberti

invent polyalphabetic cipher

5
New cards

Polyalphabetic cipher

first mechanical cipher machine.

6
New cards

Joseph Henry

Built an electric device.

7
New cards

Charles Babbage

broke Vigenere’s autokey cipher (the unbreakable cipher of the time).

8
New cards

Marian Rejewski

First break of German Army Enigma in Poland

9
New cards

Charles Bennett & Giles Brassard

designed the first quantum cryptography protocol, BB84.

10
New cards

BB84

first quantum cryptography protocol

11
New cards

Microsoft and its allies

vow to end “full disclosure” of security vulnerabilities by replacing it with “responsible” disclosure guidelines.

12
New cards

Cryptography

the art of writing and solving codes.

·        The study of methods to make and break secret codes.

·        it was used to send secret messages

·        Fundamental part of securing digital communications and data.

·        Intersection of mathematics and security.

13
New cards

Plain Text

Messages that is going to be transmitted or stored is plain text. Anyone can read plain text

14
New cards

Encryption

The method by which we can hide the actual meaning of plain text.

15
New cards

Cipher Text

The result of encryption which results in unreadable gibberish.

16
New cards

Decryption

The method by which the original meaning of cipher text can be recovered (converting cipher text to plaintext.

17
New cards

Key

It is the secret piece of information which is used for encryption and decryption in Cryptography.

18
New cards

Caesar Cipher (Shift Cipher)

one of the simplest forms of encryption.

·        It is a substitution cipher where each letter in the original message (called plain text) is replaced with a letter corresponding to a certain number of letters up down in the alphabet.

19
New cards

Decimation Cipher

Key must be a number that is relatively prime to 26 (numbers in alphabet).’

  • Multiply the number representing each letter by the key, and take the result modulo 26.

20
New cards

Shift Ciphers Method

The other way of encrypting and decrypting information