This preview shows pages 1–3. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: on a key to use RSA is Asymmetric Unbreakable Midterm Topics What is Steganography? What is Cryptography? Transposition Ciphers Example: Rail Shift Ciphers Substitution Ciphers: Making and Breaking Them Monoalphabetic Caesar Shift Codes, Nomenclators Monoalphabetic with Codeword Monoalphabetic with Homophones Polyalphabetic: The Vigenere Cipher One-time Pad Ciphers Book Ciphers Binary representations (e.g., ASCII) An example binary transposition cipher An example binary substitution cipher Public-Key Cryptography The Key Distribution Problem / Padlock Metaphor One-way Functions Modular Arithmetic The Diffie-Hellman Protocol Asymmetric Ciphers (vs. Symmetric) RSA...
View Full Document
- Winter '08