Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Better Know Cryptography History
Search
Sponsored
·
SiteGround - Reliable hosting with speed, security, and support you can count on.
→
John Downey
September 26, 2011
Programming
1
200
Better Know Cryptography History
John Downey
September 26, 2011
Tweet
Share
More Decks by John Downey
See All by John Downey
Cryptography Pitfalls at CactusCon 2019
jtdowney
0
190
Intro to Cybersecurity Workshop
jtdowney
0
150
Cryptography Pitfalls at BsidesMSP 2017
jtdowney
0
200
Cryptography Pitfalls at THOTCON 0x8
jtdowney
0
210
Cryptography Pitfalls at ConFoo Montreal 2017
jtdowney
1
360
Cryptography Pitfalls at BSidesPhilly 2016
jtdowney
0
160
Cryptography Pitfalls at LASCON 2016
jtdowney
0
220
Debugging TLS/SSL at DevOps Days Detroit 2016
jtdowney
1
280
Debugging TLS/SSL at DevOpsDays Boston
jtdowney
1
360
Other Decks in Programming
See All in Programming
Unity6.3 AudioUpdate
cova8bitdots
0
130
ポーリング処理廃止によるイベント駆動アーキテクチャへの移行
seitarof
3
1.1k
AI Assistants for Your Angular Solutions
manfredsteyer
PRO
0
140
AI時代のソフトウェア開発でも「人が仕様を書く」から始めよう-医療IT現場での実践とこれから
koukimiura
0
150
米国のサイバーセキュリティタイムラインと見る Goの暗号パッケージの進化
tomtwinkle
2
590
CDIの誤解しがちな仕様とその対処TIPS
futokiyo
0
220
OTP を自動で入力する裏技
megabitsenmzq
0
110
nuget-server - あなたが必要だったNuGetサーバー
kekyo
PRO
0
250
エージェント開発初心者の僕がエージェントを作った話と今後やりたいこと
thasu0123
0
250
nilとは何か 〜interfaceの構造とnil!=nilから理解する〜
kuro_kurorrr
3
1.9k
AI駆動開発の本音 〜Claude Code並列開発で見えたエンジニアの新しい役割〜
hisuzuya
4
510
Rで始めるML・LLM活用入門
wakamatsu_takumu
0
180
Featured
See All Featured
The B2B funnel & how to create a winning content strategy
katarinadahlin
PRO
1
300
How Software Deployment tools have changed in the past 20 years
geshan
0
33k
DBのスキルで生き残る技術 - AI時代におけるテーブル設計の勘所
soudai
PRO
63
51k
How to make the Groovebox
asonas
2
2k
The SEO identity crisis: Don't let AI make you average
varn
0
410
<Decoding/> the Language of Devs - We Love SEO 2024
nikkihalliwell
1
150
Scaling GitHub
holman
464
140k
How to Create Impact in a Changing Tech Landscape [PerfNow 2023]
tammyeverts
55
3.3k
The World Runs on Bad Software
bkeepers
PRO
72
12k
The Power of CSS Pseudo Elements
geoffreycrofte
82
6.2k
Sam Torres - BigQuery for SEOs
techseoconnect
PRO
0
220
技術選定の審美眼(2025年版) / Understanding the Spiral of Technologies 2025 edition
twada
PRO
118
110k
Transcript
None
¡ Used transposition ¡ Not very complex §
Most people couldn’t read anyway ¡ Caesar cipher (shift 3) § Hello § Khoor ¡ ROT-‐13
¡ A type of polyalphabetic cipher ¡ Confederacy
used during the Civil War ¡ Used a repeating key ¡ Example § ATTACKATDAWN § LEMONLEMONLE § LXFOPVEFRNHR
¡ Used by Nazi’s during World War 2
¡ Was another type of polyalphabetic cipher ¡ One or more rotors would tweak settings ¡ Each rotor changed daily ¡ Allies eventually broke the code
¡ Based on really hard math problems ¡
One-‐way hash § MD5, SHA1, etc ¡ Symmetric cipher § Works with a shared key § DES, Blowfish, AES, etc ¡ Asymmetric cipher § Works with public/private keys § DSA, RSA, etc
WXRCZTRNXZPZOLGMSUYSQLDGZVHHDTEUS MBPXCLDIGSOIWBOBPMPVDCNFIRHULLIWV TYIJMJWOLFNFPPXJIZSHRLWWGDUHVNCWK BUAIUMWECQNTVPTHZZLNVZPNPNWETIJCN JLJSUNQOFZAAHNHGRUYWBPLMRZFXFVMGI WKWMNPQVASUHCIUOMFKJEKTRGIMSATKYQ SHWSDVNAUKIWXHLFKUOTEPQECBUWKLABM AXVPJZTFMCGNZYHZGPOPWCPQUUSVUSNHO GFJREDHHSKZBNFPELMTQZMKLFLKOPDOTY ZTFALPIGWLJNPAKTJXIEMNUVKRSGNFKNM
OWHEAFYXGNXIJUFQWTOSZLGEQBKXBEMCV UTJKOWYBANQGOGAXLMCCLTXMOZTLHWYDE DMAGIEEJKRYCQGMVRGPASPJXRETHHPQUA VSDEWOVKLSFGBWOFMRJEBWBIRHCGBKMVY LTGUSTXZETGAJNYXJPQSSWYIRUDPOHCUX OMRKZ