From 1685a797046faf5b05c637a7ca29784192f3435d Mon Sep 17 00:00:00 2001 From: Jet Hughes Date: Wed, 27 Jul 2022 17:21:57 +1200 Subject: [PATCH] vault backup: 2022-07-27 17:21:57 --- content/notes/05-crypography.md | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/content/notes/05-crypography.md b/content/notes/05-crypography.md index d5c8edc38..64de4ca54 100644 --- a/content/notes/05-crypography.md +++ b/content/notes/05-crypography.md @@ -27,6 +27,11 @@ We all have legit needs for privacy. Cryptography provides technical measure for - caesar cipher - simple substitution scheme (rotation) - vulnerable to cryptanalysis + - key is a single integer + - symmetrical (same key for encrypt and decrypt) + - so ciphertext has the same patterns as the plaintext e.g., letter frequencies + - this leads to cryptanalysis: systematic ways of determining the encryption scheme + - modern ciphers aim to make the cipher text resemble *noise* (random data) # General process - encrypt @@ -45,4 +50,5 @@ mathmatically # Plaintext refers to unencypted message. In the digital age the messages are often not plain text (ascii, unicode, etc). -digital crypto schemes normally work on the binary data (images, .docs, .txt, mp4 etc.) \ No newline at end of file +digital crypto schemes normally work on the binary data (images, .docs, .txt, mp4 etc.) +