1 / 8

Cryptography

Cryptography. Yizhou Wang. T echniques for secure communication in the presence of third parties. It is about constructing and analyzing protocols  that overcome the influence of adversaries  and which are related to various aspects in  information security. What is Cryptography?.

ayasha
Download Presentation

Cryptography

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cryptography Yizhou Wang

  2. Techniques for secure communication in the presence of third parties. • It is about constructing and analyzing protocols that overcome the influence of adversaries and which are related to various aspects in information security. What is Cryptography?

  3. Simple Design Changing the order of words, letters Backwards English EES UOY TA EHT EROTS. Answer: See you at the store. Lumping Words IBETTHISISHARDFORMANYPEOPLE. Answer: I bet this is hard for many people.

  4. Alphabet Substitution

  5. Alphabet Wheel The plain alphabet in the inside the circle and the cipher alphabet on the outside. • Letter Spokes Cipher Clock Take each letter in the wheel and line it up with another letter somewhere else in the wheel.

  6. "IL fvbyzlsm; lclyfvullszlpzhsylhkfahrlu. " -  VzjhyDpskl Hint: L=E • Answer: " Be Yourself; Everyone Else is Already Taken. " - Oscar Wilde My Code

  7. Compass Cipher Make a cross and write out the letters of the alphabet along each line, spiraling outwards.

  8. https://www.google.com/search?q=Alphabet+Wheel&rlz=1C1CHFX_enUS517US522&espv=2&tbm=isch&tbo=u&source=univ&sa=X&ei=uI6PU4mwNIiMqgbkw4Aw&ved=0CB8QsAQ&biw=1366&bih=643https://www.google.com/search?q=Alphabet+Wheel&rlz=1C1CHFX_enUS517US522&espv=2&tbm=isch&tbo=u&source=univ&sa=X&ei=uI6PU4mwNIiMqgbkw4Aw&ved=0CB8QsAQ&biw=1366&bih=643 • https://www.google.com/search?q=Compass+cipher&rlz=1C1CHFX_enUS517US522&espv=2&tbm=isch&tbo=u&source=univ&sa=X&ei=ioPU4eAF4aEqgaQqoDwDg&ved=0CE0QsAQ&biw=1366&bih=643 • http://en.wikipedia.org/wiki/Pig_Latin • http://en.wikipedia.org/wiki/Cryptography

More Related