Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Better Know Cryptography History
Search
John Downey
September 26, 2011
Programming
1
190
Better Know Cryptography History
John Downey
September 26, 2011
Tweet
Share
More Decks by John Downey
See All by John Downey
Cryptography Pitfalls at CactusCon 2019
jtdowney
0
160
Intro to Cybersecurity Workshop
jtdowney
0
130
Cryptography Pitfalls at BsidesMSP 2017
jtdowney
0
170
Cryptography Pitfalls at THOTCON 0x8
jtdowney
0
170
Cryptography Pitfalls at ConFoo Montreal 2017
jtdowney
1
350
Cryptography Pitfalls at BSidesPhilly 2016
jtdowney
0
150
Cryptography Pitfalls at LASCON 2016
jtdowney
0
200
Debugging TLS/SSL at DevOps Days Detroit 2016
jtdowney
1
260
Debugging TLS/SSL at DevOpsDays Boston
jtdowney
1
340
Other Decks in Programming
See All in Programming
理論と実務のギャップを超える
eycjur
0
170
The Past, Present, and Future of Enterprise Java
ivargrimstad
0
150
SODA - FACT BOOK(JP)
sodainc
1
8.6k
NixOS + Kubernetesで構築する自宅サーバーのすべて
ichi_h3
0
1.1k
3年ぶりにコードを書いた元CTOが Claude Codeと30分でMVPを作った話
maikokojima
0
620
Server Side Kotlin Meetup vol.16: 内部動作を理解して ハイパフォーマンスなサーバサイド Kotlin アプリケーションを書こう
ternbusty
3
230
When Dependencies Fail: Building Antifragile Applications in a Fragile World
selcukusta
0
110
Leading Effective Engineering Teams in the AI Era
addyosmani
7
570
Six and a half ridiculous things to do with Quarkus
hollycummins
0
210
登壇は dynamic! な営みである / speech is dynamic
da1chi
0
350
Writing Better Go: Lessons from 10 Code Reviews
konradreiche
3
5.8k
Catch Up: Go Style Guide Update
andpad
0
240
Featured
See All Featured
Build The Right Thing And Hit Your Dates
maggiecrowley
37
2.9k
Raft: Consensus for Rubyists
vanstee
140
7.2k
Rails Girls Zürich Keynote
gr2m
95
14k
Stop Working from a Prison Cell
hatefulcrawdad
271
21k
Why You Should Never Use an ORM
jnunemaker
PRO
59
9.6k
I Don’t Have Time: Getting Over the Fear to Launch Your Podcast
jcasabona
34
2.5k
Music & Morning Musume
bryan
46
6.9k
How STYLIGHT went responsive
nonsquared
100
5.8k
Building Applications with DynamoDB
mza
96
6.7k
The Invisible Side of Design
smashingmag
302
51k
Done Done
chrislema
185
16k
Sharpening the Axe: The Primacy of Toolmaking
bcantrill
46
2.5k
Transcript
None
¡ Used transposition ¡ Not very complex §
Most people couldn’t read anyway ¡ Caesar cipher (shift 3) § Hello § Khoor ¡ ROT-‐13
¡ A type of polyalphabetic cipher ¡ Confederacy
used during the Civil War ¡ Used a repeating key ¡ Example § ATTACKATDAWN § LEMONLEMONLE § LXFOPVEFRNHR
¡ Used by Nazi’s during World War 2
¡ Was another type of polyalphabetic cipher ¡ One or more rotors would tweak settings ¡ Each rotor changed daily ¡ Allies eventually broke the code
¡ Based on really hard math problems ¡
One-‐way hash § MD5, SHA1, etc ¡ Symmetric cipher § Works with a shared key § DES, Blowfish, AES, etc ¡ Asymmetric cipher § Works with public/private keys § DSA, RSA, etc
WXRCZTRNXZPZOLGMSUYSQLDGZVHHDTEUS MBPXCLDIGSOIWBOBPMPVDCNFIRHULLIWV TYIJMJWOLFNFPPXJIZSHRLWWGDUHVNCWK BUAIUMWECQNTVPTHZZLNVZPNPNWETIJCN JLJSUNQOFZAAHNHGRUYWBPLMRZFXFVMGI WKWMNPQVASUHCIUOMFKJEKTRGIMSATKYQ SHWSDVNAUKIWXHLFKUOTEPQECBUWKLABM AXVPJZTFMCGNZYHZGPOPWCPQUUSVUSNHO GFJREDHHSKZBNFPELMTQZMKLFLKOPDOTY ZTFALPIGWLJNPAKTJXIEMNUVKRSGNFKNM
OWHEAFYXGNXIJUFQWTOSZLGEQBKXBEMCV UTJKOWYBANQGOGAXLMCCLTXMOZTLHWYDE DMAGIEEJKRYCQGMVRGPASPJXRETHHPQUA VSDEWOVKLSFGBWOFMRJEBWBIRHCGBKMVY LTGUSTXZETGAJNYXJPQSSWYIRUDPOHCUX OMRKZ