$30 off During Our Annual Pro Sale. View Details »
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Better Know Cryptography History
Search
John Downey
September 26, 2011
Programming
1
190
Better Know Cryptography History
John Downey
September 26, 2011
Tweet
Share
More Decks by John Downey
See All by John Downey
Cryptography Pitfalls at CactusCon 2019
jtdowney
0
170
Intro to Cybersecurity Workshop
jtdowney
0
130
Cryptography Pitfalls at BsidesMSP 2017
jtdowney
0
180
Cryptography Pitfalls at THOTCON 0x8
jtdowney
0
180
Cryptography Pitfalls at ConFoo Montreal 2017
jtdowney
1
350
Cryptography Pitfalls at BSidesPhilly 2016
jtdowney
0
150
Cryptography Pitfalls at LASCON 2016
jtdowney
0
210
Debugging TLS/SSL at DevOps Days Detroit 2016
jtdowney
1
270
Debugging TLS/SSL at DevOpsDays Boston
jtdowney
1
350
Other Decks in Programming
See All in Programming
FluorTracer / RayTracingCamp11
kugimasa
0
240
【Streamlit x Snowflake】データ基盤からアプリ開発・AI活用まで、すべてをSnowflake内で実現
ayumu_yamaguchi
1
120
令和最新版Android Studioで化石デバイス向けアプリを作る
arkw
0
410
AI時代を生き抜く 新卒エンジニアの生きる道
coconala_engineer
1
290
Navigation 3: 적응형 UI를 위한 앱 탐색
fornewid
1
350
S3 VectorsとStrands Agentsを利用したAgentic RAGシステムの構築
tosuri13
6
320
20251212 AI 時代的 Legacy Code 營救術 2025 WebConf
mouson
0
190
AIコーディングエージェント(Gemini)
kondai24
0
240
著者と進める!『AIと個人開発したくなったらまずCursorで要件定義だ!』
yasunacoffee
0
150
Full-Cycle Reactivity in Angular: SignalStore mit Signal Forms und Resources
manfredsteyer
PRO
0
150
「コードは上から下へ読むのが一番」と思った時に、思い出してほしい話
panda728
PRO
38
26k
SwiftUIで本格音ゲー実装してみた
hypebeans
0
420
Featured
See All Featured
YesSQL, Process and Tooling at Scale
rocio
174
15k
The Cost Of JavaScript in 2023
addyosmani
55
9.4k
It's Worth the Effort
3n
187
29k
Git: the NoSQL Database
bkeepers
PRO
432
66k
GraphQLとの向き合い方2022年版
quramy
50
14k
Evolution of real-time – Irina Nazarova, EuRuKo, 2024
irinanazarova
9
1.1k
How GitHub (no longer) Works
holman
316
140k
Speed Design
sergeychernyshev
33
1.4k
"I'm Feeling Lucky" - Building Great Search Experiences for Today's Users (#IAC19)
danielanewman
231
22k
Practical Tips for Bootstrapping Information Extraction Pipelines
honnibal
25
1.6k
Optimising Largest Contentful Paint
csswizardry
37
3.5k
Understanding Cognitive Biases in Performance Measurement
bluesmoon
32
2.8k
Transcript
None
¡ Used transposition ¡ Not very complex §
Most people couldn’t read anyway ¡ Caesar cipher (shift 3) § Hello § Khoor ¡ ROT-‐13
¡ A type of polyalphabetic cipher ¡ Confederacy
used during the Civil War ¡ Used a repeating key ¡ Example § ATTACKATDAWN § LEMONLEMONLE § LXFOPVEFRNHR
¡ Used by Nazi’s during World War 2
¡ Was another type of polyalphabetic cipher ¡ One or more rotors would tweak settings ¡ Each rotor changed daily ¡ Allies eventually broke the code
¡ Based on really hard math problems ¡
One-‐way hash § MD5, SHA1, etc ¡ Symmetric cipher § Works with a shared key § DES, Blowfish, AES, etc ¡ Asymmetric cipher § Works with public/private keys § DSA, RSA, etc
WXRCZTRNXZPZOLGMSUYSQLDGZVHHDTEUS MBPXCLDIGSOIWBOBPMPVDCNFIRHULLIWV TYIJMJWOLFNFPPXJIZSHRLWWGDUHVNCWK BUAIUMWECQNTVPTHZZLNVZPNPNWETIJCN JLJSUNQOFZAAHNHGRUYWBPLMRZFXFVMGI WKWMNPQVASUHCIUOMFKJEKTRGIMSATKYQ SHWSDVNAUKIWXHLFKUOTEPQECBUWKLABM AXVPJZTFMCGNZYHZGPOPWCPQUUSVUSNHO GFJREDHHSKZBNFPELMTQZMKLFLKOPDOTY ZTFALPIGWLJNPAKTJXIEMNUVKRSGNFKNM
OWHEAFYXGNXIJUFQWTOSZLGEQBKXBEMCV UTJKOWYBANQGOGAXLMCCLTXMOZTLHWYDE DMAGIEEJKRYCQGMVRGPASPJXRETHHPQUA VSDEWOVKLSFGBWOFMRJEBWBIRHCGBKMVY LTGUSTXZETGAJNYXJPQSSWYIRUDPOHCUX OMRKZ