k k k k k k k
1. CrypTool: Software which allows encryption of text using historic algorithms
k k k k k k k k k
2. The Enigma Machine: In World War II the Germans made use of an electro-me-
k k k k k k k k k k k k k
chanical rotor based cipher Known as The Enigma Machine.
k k k k k k k k k
Allied cipher machines used in WWII included the British TypeX and the AmericanSI
k k k k k k k k k k k k k
GABA.
3. The ADFGVX Cipher: invented by Colonel Fritz Nebel in 1918.
k k k k k k k k k
The key for this algorithm is a six-by-six square of letters, used to encode a 36-
k k k k k k k k k k k k k k k
letteralphabet.
k
4. The Playfair Cipher: invented in 1854 by Charles Wheatstone.
k k k k k k k k
The Playfair cipher uses a five-by-five table containing a keyword or key phrase.
k k k k k k k k k k k k
5. Breaking the Vigene k k
re Ciph:eIrn 1863, Friedrich Kasiski was the first personto publish a successful gen
k k k k k k k k k k k k k
eral attack on the Vigene
k k k k re Cipher
k
1k/k20
,6. The Vigene k re Ciph:eT
k r his is perhaps the most widely known multi- k k k k k k k k
alphabet substitution cipher. invented in 1553 by Giovan Battista Bellaso. Uses a se
k k k k k k k k k k k k
ries ofdifferent Caesar ciphers based on the letters of a keyword.
k k k k k k k k k k k
7. The Cipher Disk: The cipher disk was invented by Leon Alberti in 1466. eachtim
k k k k k k k k k k k k k k
e you turned the disk, you used a new cipher. It was literally a disk you turnedto encr
k k k k k k k k k k k k k k k k k k
ypt plaintext.
k
8. Multi-
Alphabet Substitution: Use of multiple substitution alphabets.Example:
k k k k k k k
Cipher Disk, Vigenere Cipher, Enigma Machine
k k k k k
9. Scytale: This was a cylinder tool used by the Greeks, and is often specificallyattr
k k k k k k k k k k k k k k
ibuted to the Spartans. Physical cylinder that was used to encrypt messages.
k k k k k k k k k k k
10. ROT13 Cipher: It is essentially the Caesar cipher always using a rotation orshi
k k k k k k k k k k k k k
ft of 13 characters.
k k k
11. The ATBASH Cipher: Hebrew scribes copying religious texts used this cipher.su
k k k k k k k k k k k
bstitutes the first letter of the alphabet for the
k k k k k k k k
last, and the second letter for the second-to-the-last, etc.
k k k k k k k k
12. The Caesar Cipher: You can choose to shift any number of letters, either leftor r
k k k k k k k k k k k k k k k
ight. If you choose to shift two to
k k k k k k k
the right, that would be a +2; if you choose to shift four to the left, that would be a
k k k k k k k k k k k k k k k k k k k
-4.
13. Mono-Alphabet Substitution: These algorithms k k k
2k/k20
,simply substitute one character of cipher text for each character of plain text.
k k k k k k k k k k k k
3k/k20
, Examples: Atbash Cipher, Caesar Cipher, Rot13 k k k k k
14. Symmetric Cryptography: It is simply any algorithm where the key used tode k k k k k k k k k k k k
crypt a message is the same key used to encrypt.
k k k k k k k k k
15. Diffusion: Changes to one character in the plain text affect multiple charactersin t
k k k k k k k k k k k k k
he cipher text.
k k
16. Confusion: Confusion attempts to make the relationship between the statisti- k k k k k k k k k
cal frequencies of the cipher text and the actual key as complex as possible. Thisocc
k k k k k k k k k k k k k k k k
urs by using a complex substitution algorithm.
k k k k k k
17. Avalanche: a small change yields large effects in the output, This is Fiestel'svar
k k k k k k k k k k k k k
iation on Claude Shannon's concept of diffusion.
k k k k k k
18. Kerckhoffs's Principle: This principle states that a cryptosystem should bese k k k k k k k k k k
cure even if everything about the system, except the key, is publicly known.
k k k k k k k k k k k k
19. Substitution: Substitution is changing some part of the plaintext for somem k k k k k k k k k k k
atching part of the Cipher Text. k k k k k
20. Transposition: Transposition is the swapping of blocks of ciphertext. k k k k k k k k
21. binary numbers: there are three operations not found in normal math:A
k k k k k k k k k k k
ND, OR, and XOR operations.
k k k k
22. Binary AND: If both numbers have a one in both places, then the resultantnu
k k k k k k k k k k k k k k
mber is a one. k k k
1101
1001
4k/k20