mirror of
https://github.com/jackyzha0/quartz.git
synced 2025-12-26 22:34:06 -06:00
vault backup: 2022-07-27 17:21:57
This commit is contained in:
parent
fa4b424ac4
commit
1685a79704
@ -27,6 +27,11 @@ We all have legit needs for privacy. Cryptography provides technical measure for
|
|||||||
- caesar cipher
|
- caesar cipher
|
||||||
- simple substitution scheme (rotation)
|
- simple substitution scheme (rotation)
|
||||||
- vulnerable to cryptanalysis
|
- vulnerable to cryptanalysis
|
||||||
|
- key is a single integer
|
||||||
|
- symmetrical (same key for encrypt and decrypt)
|
||||||
|
- so ciphertext has the same patterns as the plaintext e.g., letter frequencies
|
||||||
|
- this leads to cryptanalysis: systematic ways of determining the encryption scheme
|
||||||
|
- modern ciphers aim to make the cipher text resemble *noise* (random data)
|
||||||
|
|
||||||
# General process
|
# General process
|
||||||
- encrypt
|
- encrypt
|
||||||
@ -46,3 +51,4 @@ mathmatically
|
|||||||
refers to unencypted message. In the digital age the messages are often not plain text (ascii, unicode, etc).
|
refers to unencypted message. In the digital age the messages are often not plain text (ascii, unicode, etc).
|
||||||
|
|
||||||
digital crypto schemes normally work on the binary data (images, .docs, .txt, mp4 etc.)
|
digital crypto schemes normally work on the binary data (images, .docs, .txt, mp4 etc.)
|
||||||
|
|
||||||
|
|||||||
Loading…
Reference in New Issue
Block a user