Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Better Know Cryptography History
Search
John Downey
September 26, 2011
Programming
1
190
Better Know Cryptography History
John Downey
September 26, 2011
Tweet
Share
More Decks by John Downey
See All by John Downey
Cryptography Pitfalls at CactusCon 2019
jtdowney
0
160
Intro to Cybersecurity Workshop
jtdowney
0
120
Cryptography Pitfalls at BsidesMSP 2017
jtdowney
0
170
Cryptography Pitfalls at THOTCON 0x8
jtdowney
0
170
Cryptography Pitfalls at ConFoo Montreal 2017
jtdowney
1
340
Cryptography Pitfalls at BSidesPhilly 2016
jtdowney
0
150
Cryptography Pitfalls at LASCON 2016
jtdowney
0
200
Debugging TLS/SSL at DevOps Days Detroit 2016
jtdowney
1
250
Debugging TLS/SSL at DevOpsDays Boston
jtdowney
1
330
Other Decks in Programming
See All in Programming
Team operations that are not burdened by SRE
kazatohiei
1
300
A2A プロトコルを試してみる
azukiazusa1
2
1.3k
なぜ「共通化」を考え、失敗を繰り返すのか
rinchoku
1
640
Webの外へ飛び出せ NativePHPが切り拓くPHPの未来
takuyakatsusa
2
510
ISUCON研修おかわり会 講義スライド
arfes0e2b3c
1
400
VS Code Update for GitHub Copilot
74th
2
610
C++20 射影変換
faithandbrave
0
560
すべてのコンテキストを、 ユーザー価値に変える
applism118
3
1.2k
GitHub Copilot and GitHub Codespaces Hands-on
ymd65536
2
140
LT 2025-06-30: プロダクトエンジニアの役割
yamamotok
0
700
What Spring Developers Should Know About Jakarta EE
ivargrimstad
0
410
ふつうの技術スタックでアート作品を作ってみる
akira888
0
420
Featured
See All Featured
Building Adaptive Systems
keathley
43
2.6k
Sharpening the Axe: The Primacy of Toolmaking
bcantrill
44
2.4k
Chrome DevTools: State of the Union 2024 - Debugging React & Beyond
addyosmani
7
730
Dealing with People You Can't Stand - Big Design 2015
cassininazir
367
26k
Why You Should Never Use an ORM
jnunemaker
PRO
58
9.4k
Scaling GitHub
holman
459
140k
Building Better People: How to give real-time feedback that sticks.
wjessup
367
19k
The MySQL Ecosystem @ GitHub 2015
samlambert
251
13k
Unsuck your backbone
ammeep
671
58k
The Cost Of JavaScript in 2023
addyosmani
51
8.5k
Thoughts on Productivity
jonyablonski
69
4.7k
A Tale of Four Properties
chriscoyier
160
23k
Transcript
None
¡ Used transposition ¡ Not very complex §
Most people couldn’t read anyway ¡ Caesar cipher (shift 3) § Hello § Khoor ¡ ROT-‐13
¡ A type of polyalphabetic cipher ¡ Confederacy
used during the Civil War ¡ Used a repeating key ¡ Example § ATTACKATDAWN § LEMONLEMONLE § LXFOPVEFRNHR
¡ Used by Nazi’s during World War 2
¡ Was another type of polyalphabetic cipher ¡ One or more rotors would tweak settings ¡ Each rotor changed daily ¡ Allies eventually broke the code
¡ Based on really hard math problems ¡
One-‐way hash § MD5, SHA1, etc ¡ Symmetric cipher § Works with a shared key § DES, Blowfish, AES, etc ¡ Asymmetric cipher § Works with public/private keys § DSA, RSA, etc
WXRCZTRNXZPZOLGMSUYSQLDGZVHHDTEUS MBPXCLDIGSOIWBOBPMPVDCNFIRHULLIWV TYIJMJWOLFNFPPXJIZSHRLWWGDUHVNCWK BUAIUMWECQNTVPTHZZLNVZPNPNWETIJCN JLJSUNQOFZAAHNHGRUYWBPLMRZFXFVMGI WKWMNPQVASUHCIUOMFKJEKTRGIMSATKYQ SHWSDVNAUKIWXHLFKUOTEPQECBUWKLABM AXVPJZTFMCGNZYHZGPOPWCPQUUSVUSNHO GFJREDHHSKZBNFPELMTQZMKLFLKOPDOTY ZTFALPIGWLJNPAKTJXIEMNUVKRSGNFKNM
OWHEAFYXGNXIJUFQWTOSZLGEQBKXBEMCV UTJKOWYBANQGOGAXLMCCLTXMOZTLHWYDE DMAGIEEJKRYCQGMVRGPASPJXRETHHPQUA VSDEWOVKLSFGBWOFMRJEBWBIRHCGBKMVY LTGUSTXZETGAJNYXJPQSSWYIRUDPOHCUX OMRKZ