Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Transcript of Cryptology
Caesar Cipher Cryptology HELLO EVERYONE L I PPS IZ I VCSR I The code wheel uses the Caesar Cipher is translated to The Caesar Cipher is a way to encode data without the use of a machine Julias Caesar created this system in order to secretly share his information with people Cryptology is the study of carrying out secret information Encoding is the process of transforming normal text (plaintext) into scrambled text. The outer ring is the real alphabet and the inner ring is the "secret" alphabet Once you correspond the outer letters with the inner letters, Messages can be encoded through mathmatical methods or by the use of machines
Enigma was a powerful coding machine the was developed by Germany during World War II THE END Decoding is the process of translating coded text into plaintext Decoding is a difficult process because there are many different methods of encoding Cryptanalysts are people who decode encoded messages. Typewriter-like keyboard in
QWERTZ format Three rotors that scramble text Each type on the keyboard signals the
rotors to move causing scrambled text The methods of decoding that
cryptanalysts use are called attacks. There are two main types of attacks that are used to break a code with a key to plaintext.
dictionary In a brute force attack, the cryptanalyst uses every letter, number, and character in order to break the code.
This method would take an extremely long time. In a dictionary attack, the cryptanalyst uses every word in the dictionary to see if any word is the code to the plaintext.
This would take a shorter time if the code to the plaintext was a word. If not, the cryptanalyst would have to resort to a different method.