Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Better Know Cryptography History
Search
John Downey
September 26, 2011
Programming
1
190
Better Know Cryptography History
John Downey
September 26, 2011
Tweet
Share
More Decks by John Downey
See All by John Downey
Cryptography Pitfalls at CactusCon 2019
jtdowney
0
150
Intro to Cybersecurity Workshop
jtdowney
0
120
Cryptography Pitfalls at BsidesMSP 2017
jtdowney
0
160
Cryptography Pitfalls at THOTCON 0x8
jtdowney
0
160
Cryptography Pitfalls at ConFoo Montreal 2017
jtdowney
1
340
Cryptography Pitfalls at BSidesPhilly 2016
jtdowney
0
140
Cryptography Pitfalls at LASCON 2016
jtdowney
0
190
Debugging TLS/SSL at DevOps Days Detroit 2016
jtdowney
1
210
Debugging TLS/SSL at DevOpsDays Boston
jtdowney
1
300
Other Decks in Programming
See All in Programming
OSSで起業してもうすぐ10年 / Open Source Conference 2024 Shimane
furukawayasuto
0
110
Nurturing OpenJDK distribution: Eclipse Temurin Success History and plan
ivargrimstad
0
1k
Figma Dev Modeで変わる!Flutterの開発体験
watanave
0
150
イマのCSSでできる インタラクション最前線 + CSS最新情報
clockmaker
3
350
2024/11/8 関西Kaggler会 2024 #3 / Kaggle Kernel で Gemma 2 × vLLM を動かす。
kohecchi
5
940
Enabling DevOps and Team Topologies Through Architecture: Architecting for Fast Flow
cer
PRO
0
340
A Journey of Contribution and Collaboration in Open Source
ivargrimstad
0
1k
C++でシェーダを書く
fadis
6
4.1k
Micro Frontends Unmasked Opportunities, Challenges, Alternatives
manfredsteyer
PRO
0
110
イベント駆動で成長して委員会
happymana
1
340
Click-free releases & the making of a CLI app
oheyadam
2
120
Creating a Free Video Ad Network on the Edge
mizoguchicoji
0
120
Featured
See All Featured
A Philosophy of Restraint
colly
203
16k
What's in a price? How to price your products and services
michaelherold
243
12k
4 Signs Your Business is Dying
shpigford
180
21k
Being A Developer After 40
akosma
87
590k
KATA
mclloyd
29
14k
How STYLIGHT went responsive
nonsquared
95
5.2k
Performance Is Good for Brains [We Love Speed 2024]
tammyeverts
6
430
Agile that works and the tools we love
rasmusluckow
327
21k
Bootstrapping a Software Product
garrettdimon
PRO
305
110k
How to Create Impact in a Changing Tech Landscape [PerfNow 2023]
tammyeverts
47
2.1k
Thoughts on Productivity
jonyablonski
67
4.3k
The World Runs on Bad Software
bkeepers
PRO
65
11k
Transcript
None
¡ Used transposition ¡ Not very complex §
Most people couldn’t read anyway ¡ Caesar cipher (shift 3) § Hello § Khoor ¡ ROT-‐13
¡ A type of polyalphabetic cipher ¡ Confederacy
used during the Civil War ¡ Used a repeating key ¡ Example § ATTACKATDAWN § LEMONLEMONLE § LXFOPVEFRNHR
¡ Used by Nazi’s during World War 2
¡ Was another type of polyalphabetic cipher ¡ One or more rotors would tweak settings ¡ Each rotor changed daily ¡ Allies eventually broke the code
¡ Based on really hard math problems ¡
One-‐way hash § MD5, SHA1, etc ¡ Symmetric cipher § Works with a shared key § DES, Blowfish, AES, etc ¡ Asymmetric cipher § Works with public/private keys § DSA, RSA, etc
WXRCZTRNXZPZOLGMSUYSQLDGZVHHDTEUS MBPXCLDIGSOIWBOBPMPVDCNFIRHULLIWV TYIJMJWOLFNFPPXJIZSHRLWWGDUHVNCWK BUAIUMWECQNTVPTHZZLNVZPNPNWETIJCN JLJSUNQOFZAAHNHGRUYWBPLMRZFXFVMGI WKWMNPQVASUHCIUOMFKJEKTRGIMSATKYQ SHWSDVNAUKIWXHLFKUOTEPQECBUWKLABM AXVPJZTFMCGNZYHZGPOPWCPQUUSVUSNHO GFJREDHHSKZBNFPELMTQZMKLFLKOPDOTY ZTFALPIGWLJNPAKTJXIEMNUVKRSGNFKNM
OWHEAFYXGNXIJUFQWTOSZLGEQBKXBEMCV UTJKOWYBANQGOGAXLMCCLTXMOZTLHWYDE DMAGIEEJKRYCQGMVRGPASPJXRETHHPQUA VSDEWOVKLSFGBWOFMRJEBWBIRHCGBKMVY LTGUSTXZETGAJNYXJPQSSWYIRUDPOHCUX OMRKZ