Conventional Encryption Algorithms
From Computing and Software Wiki
(Difference between revisions)
Line 1: | Line 1: | ||
'''Conventional Encryption''' is ... | '''Conventional Encryption''' is ... | ||
- | [[Image:FlowDiagram.jpg|thumb|300px| | + | [[Image:FlowDiagram.jpg|thumb|300px|right|Figure 1: Flow Diagram]] |
__TOC__ | __TOC__ | ||
Line 15: | Line 15: | ||
= References = | = References = | ||
[1] [http://www.sxip.com/videos Identity 2.0 Keynote] Sxip Identity Video | [1] [http://www.sxip.com/videos Identity 2.0 Keynote] Sxip Identity Video | ||
+ | |||
[2] [http://en.wikipedia.org/wiki/Identity_2.0/ Identity 2.0] Wikipedia.org | [2] [http://en.wikipedia.org/wiki/Identity_2.0/ Identity 2.0] Wikipedia.org | ||
- | + | [[User:Angiusei|Elian]] |
Revision as of 14:31, 8 April 2008
Conventional Encryption is ...
Contents |
Classification of Ciphers
Monoalphabetic Ciphers
Polyalphabetic Ciphers
Transposition Ciphers
Synchronous Stream Ciphers
Asynchronous Stream Ciphers
References
[1] Identity 2.0 Keynote Sxip Identity Video
[2] Identity 2.0 Wikipedia.org