@rathideviTrendsCryptographyStepping2017
[!info] - Cite Key: @rathideviTrendsCryptographyStepping2017 - Link: IEEE Xplore Full Text PDF - Abstract: Thousands of years proved that Cryptography and encryption is been used for secure sheltered communication. The word Cryptography comes from the two Greek words Kryptos means hidden and Graphein means writing. Cryptography, the use of codes and ciphers to protect secrets, since from the ancient times various cryptographic techniques where as symbols used by Egypt, Spartans developed a device called Scytale used by Greece, Julius Caesar developed the Substitution cipher technique for the purpose of military used by Rome, Leon Battista Alberti invented a cipher disk which acts as an encryption system called Vigenere Cipher, Thomas Jefferson invented Wheel Cipher consisting of 26 wheels. Similarly, rulers invented War Driven Cryptography to meet with the outcome of war. Modern cryptographic techniques proves that it is been the trendsetter which ensures high security than ancient times and War Driven Cryptography. To protect a valuable information people develop better ways through a thorough understanding of cryptography and encryption which makes technology more efficient and faster. - Tags: #Ciphers, #Conferences, #Encryption, #Graphein, #kryptos, #Malware, #Scytale, #Substitution-cipher, #Technological-innovation, #Vigenere-Cipher, #War-Driven-Cryptography, #Wheels
Annotations¶
%% begin annotations %%
Imported on 2023-02-03 4:24 pm¶
Relevant / important¶
[!quote|#a28ae5] Highlight scytale
mentioned in class
Page 1 [[2023-02-03#4:05 pm]]
[!quote|#a28ae5] Highlight The war driven cryptography involves World War I(WWI) and World War II(WWII) in which Zimmerman telegram and Choctaw codetalkers invented for the purpose of World War I, whereas enigma encryption machine and purple invented for World War II.
cryptology has been around ever since humans learned to write
Page 1 [[2023-02-03#4:06 pm]]
[!quote|#a28ae5] Highlight This encryption method is an example of substitution cipher,
Very first appearance of a substitution cipher
Page 3 [[2023-02-03#4:08 pm]]
[!quote|#a28ae5] Highlight Caesar solved the secure communication problem with his troops as a commander of the Roman army. Caesar developed a substitution cipher method for the problem of messengers in secret military messages in which he substituted a letter for diverse letters
The first main substitution cipher
Page 3 [[2023-02-03#4:12 pm]]
Agree¶
[!quote|#5fb236] Highlight To receive the message an identical cylinder is needed. It was only then that the letters would line up resulting in the original message.
Its an interesting concept but seems very easy to break.
Page 3 [[2023-02-03#4:11 pm]]
[!quote|#5fb236] Highlight The cipher key is the order of the Disk, both the sender and receiver should arrange the disks in the same predefined order in the Jefferson's device which had 36 disks
Seems like a step up to the scytale
Page 4 [[2023-02-03#4:14 pm]]
[!quote|#5fb236] Highlight A Choctaw Indians from Oklahoma who pioneered the use of Native American languages as military code is called as Choctaw codetalkers.
A little funny how they used an obscure language that no one really knows as a way to hide information without much effort
Page 5 [[2023-02-03#4:18 pm]]
[!quote|#5fb236] Highlight In several countries Enigma was adopted by government and military services, most notably Nazi Germany before and during World War II.
Continues with my theme of communication is equivalent to power. Since the German's were so good at hiding their information the Allies were never able to figure out their plans leading them to be unprepared in many situations.
Page 5 [[2023-02-03#4:20 pm]]
[!quote|#5fb236] Highlight In cryptography, the one-time pad (OTP) is an encryption technique that cannot be cracked. An encryption technique called one-time pad in cryptography cannot be cracked, but it requires the use of one-time pre-shared key the same size as the message is being sent.
This seems to me to be a sort of predefined unqiue binary set.
Page 6 [[2023-02-03#4:22 pm]]
Questions / confusion¶
[!quote|#ffd400] Highlight The message can be deciphered by only those people who knew the substitution technique/method used.
I think we will see a pattern in the people with more advanced ciphers having the advantage
Page 3 [[2023-02-03#4:12 pm]]
%% end annotations %%
%% Import Date: 2023-02-03T16:24:28.241-05:00 %%