Conventional Encryption Algorithms

From Computing and Software Wiki

(Difference between revisions)
Jump to: navigation, search
Line 19: Line 19:
== References ==
== References ==
-
[1] [http://www.sxip.com/videos Identity 2.0 Keynote] Sxip Identity Video
+
[1]
-
 
+
[2]
-
[2] [http://en.wikipedia.org/wiki/Identity_2.0/ Identity 2.0] Wikipedia.org
+
== External Links ==
== External Links ==

Revision as of 15:56, 8 April 2008

Conventional Encryption is ...

Figure 1: Flow Diagram

Contents


Classification of Ciphers

Figure 2: Types of Ciphers

Monoalphabetic

This is a substitution technique that uses a single alphabet to replace symbols of plaintext for symbols of ciphertext as dictated by the key. These techniques are relatively easy to break due to the fact that symbol frequency remains invariant.

Polyalphabetic

Transposition

Synchronous Stream

Asynchronous Stream

Steganographic

Popular Algorithms

References

[1] [2]

External Links

Monoalphabetic Ciphers


Elian April 8/2008

Personal tools