From fa4b424ac4282cb074fc141d1c60acc23d61f47c Mon Sep 17 00:00:00 2001 From: Jet Hughes Date: Wed, 27 Jul 2022 17:11:57 +1200 Subject: [PATCH] vault backup: 2022-07-27 17:11:57 --- content/notes/05-crypography.md | 48 +++++++++++++++++++++++++++++++++ 1 file changed, 48 insertions(+) create mode 100644 content/notes/05-crypography.md diff --git a/content/notes/05-crypography.md b/content/notes/05-crypography.md new file mode 100644 index 000000000..d5c8edc38 --- /dev/null +++ b/content/notes/05-crypography.md @@ -0,0 +1,48 @@ +--- +title: "05-crypography" +aliases: +tags: +- lecture +- comp210 +--- + +# news +- zodiac killer code cracked +- twitter leak + +# Brief history +- study of secret messages +- confidentiality of [cia-triad](notes/cia-triad.md) +- also small role in integrity (authentication of message, and sender) +- history of cyprtopgraphy is interwined with information technology + +Language use for communication seems to be part of human nature: perhaps the use of covert lanuage is too + +## need for confidentiality +"nothing to hide: nothing to fear" look at edward snowdens corrolary + +We all have legit needs for privacy. Cryptography provides technical measure for ensuring this privacy. + +## history +- caesar cipher + - simple substitution scheme (rotation) + - vulnerable to cryptanalysis + +# General process +- encrypt + - plaintext + key => ciphertext + - key is a secret +- decrypt + - ciphertext + key => plaintext + +mathmatically +- c = e(p, k) +- p = d(c, k) + +# Terminology +- copy later + +# Plaintext +refers to unencypted message. In the digital age the messages are often not plain text (ascii, unicode, etc). + +digital crypto schemes normally work on the binary data (images, .docs, .txt, mp4 etc.) \ No newline at end of file