AsegGasiaBlog

Cryptography

Cryptography

Description
Origin of Cryptography
1.    Roots of Secret Communication
2.    Introduction to Cryptography
3.    Common Terminologies
4.    Let's review
 
Modern Cryptography
1.    Classic Crytography
2.    Modern Cryptography
3.    Let’s revise
 
Traditional Ciphers
1.    Caeser Cipher
2.    Substitution Cipher
3.    Let’s revise
 
The Codebreakers
1.    Cryptanalysis
2.    Frequency Analysis
3.    Let’s revise
 
Polyalphabetic Ciphers
1.    Types of Cipher
2.    Vigenere Square Cipher
3.    Transposition Cipher
4.    Let’s revise
 
Explaining 'Enigma'
1.    Need for Mechanization
2.    Unravelling Enigma
3.    Scrambler Arrangement
4.    Let’s revise
 
Modern Ciphers
1.    Age of Modern Ciphers
2.    Types of Modern Ciphers
3.    Let’s revise
 
Public Key Cryptography
1.    Need for Public Key Cryptography
2.    Procedure of Public Key Cryptography
3.    Let’s revise
 
Benefits of Modern Cryptography
1.    More threats to Data
2.    Data Integrity Checks
3.    Message Authentication Checks
4.    Let’s revise


Popular Posts