Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

[EN] B_I_2_NEW C_I_3_NEW

A programozás alapjai
by

My Logiscool

on 7 September 2017

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of [EN] B_I_2_NEW C_I_3_NEW

It was a pleasure working with you!
Scoolcode
COURSE
Cryptograms
&
encryption

Everyone has secrets
Can you keep a secret?
What types of secrets do exist?
private secrets,
such as if someone picks their nose
Or if you are secretly in love with
someone <3
Professional
secrets

military secrets or state secrets,
on which whole countries are depending on
How do you know if your secrets are safe?
Ancient Egypt: hyeroglyphs (holy engraving)
- solved only in the 19th century
Trojan horse
- greek warriors were hiding in, that was how they defeated the city of Troy
Encoding, Cryptography
Caesar cipher
shifting the ABC (key: number of shifts)
open ABC: a b c d e f … u v w x y z
Code ABC: D E F G H I … X Y Z A B C
Morse code
ti-ti-ta
A .-
b -...
c -.-.
d -..
e .
f ..-.
g --.
h ....
i ..
j .---
K -.-
L .-..
m --
n -.
o ---
p .--.
q --.-
r .-.
s ...
t -
u ..-
v ...-
w .--
x -..-
y -.--
z --..
sorting
substitution
Process of encoding
open text
encryption, encoding
Encrypted text
decoding
two types as follows:
- symmetric-key cryptography (sender and receiver knows the secret key
- open key cryptography (an open and a secret key)
Let us write our first encryption program!
A
Full transcript