Cryptography: Difference between revisions
No edit summary |
|||
Line 9: | Line 9: | ||
==Substitution Ciphers== | ==Substitution Ciphers== | ||
==Polybius Cipher== | |||
{| class="wikitable" | {| class="wikitable" | ||
|- | |- | ||
Line 24: | Line 25: | ||
| 5 || V || W || X || Y || Z | | 5 || V || W || X || Y || Z | ||
|} | |} | ||
==References== | ==References== | ||
<references /> | <references /> |
Revision as of 08:38, 17 February 2020
Cryptography is the science of using codes and ciphers to conceal information. Cryptology is the study of cryptography. Codes and ciphers are terms that are often used interchangeably, but they are distinctly different. A code replaces one piece of information for another entirely different piece of information where the meaning of both is known to both the sender and recipient. A common example of this may be using a phrase such as We have contact to mean We have found the thing we're looking for. A cipher, on the other hand, modified the information itself to obscure its meaning. A cipher also conceals information but does so by changing the original information (plain text) to cipher text (sometimes referred to as 'black text'). The Polybius Cipher, described below, is an early example of a substitution cipher.
A timeline of cryptography through the middle ages may be found on the House Blue Heron Cryptography website<ref>Baun, Kevin W. “Cryptography Timeline.” History of Cryptography, February 17, 2020. http://crypto.houseblueheron.com/timeline.php.</ref>.

Transposition Ciphers
A transposition cipher moves elements of the
Substitution Ciphers
Polybius Cipher
1 | 2 | 3 | 4 | 5 | |
---|---|---|---|---|---|
1 | A | B | C | D | E |
2 | F | G | H | I/J | K |
3 | L | M | N | O | P |
4 | Q | R | S | T | U |
5 | V | W | X | Y | Z |
References
<references />