Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

CODE BREAKING

No description
by

nicholas merrell

on 29 November 2017

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of CODE BREAKING

what you use to translate the code
dual purpose
is often complicated
Sometimes is simple
should be known by both parties
A brief overview of cyphers
Called cryptography and Crytpanalysis
Many forms
used in WWI and WWII
First computer was created in order to break the enigma code used by Nazis
Brief History
The code is the physical encrypted message
NOT what you use to figure out the code
The code can be any thing
you could guess what the original message was but without the cypher you could never be sure
A brief overview of codes
Used by Julius Caesar
spinny wheel
actually 26 different cyphers
Caesar shift cypher
Literally means "Move place"
Can be extremely complicated, or simple
multiple can be used to further encode a message
Tanspostion
Means rotate one letter forward
simplest code
A=B
B=C
C=D
ROT 1
CODE BREAKING
The different Codes and cyphers
Caesar Shift cypher
Transposition
ROT1
This picture uses the t cypher:
A=T
B=U
C=V
Full transcript