This preview shows pages 1–3. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.
View Full Document
Unformatted text preview: on a key to use RSA is Asymmetric Unbreakable Midterm Topics What is Steganography? What is Cryptography? Transposition Ciphers Example: Rail Shift Ciphers Substitution Ciphers: Making and Breaking Them Monoalphabetic Caesar Shift Codes, Nomenclators Monoalphabetic with Codeword Monoalphabetic with Homophones Polyalphabetic: The Vigenere Cipher Onetime Pad Ciphers Book Ciphers Binary representations (e.g., ASCII) An example binary transposition cipher An example binary substitution cipher PublicKey Cryptography The Key Distribution Problem / Padlock Metaphor Oneway Functions Modular Arithmetic The DiffieHellman Protocol Asymmetric Ciphers (vs. Symmetric) RSA...
View Full
Document
 Winter '08
 Kehler

Click to edit the document details