Conventional Encryption Algorithms
From Computing and Software Wiki
(Difference between revisions)
Line 6: | Line 6: | ||
== Classification of Ciphers == | == Classification of Ciphers == | ||
- | === Monoalphabetic | + | === Monoalphabetic === |
- | === Polyalphabetic | + | This is a substitution technique that uses a single alphabet to replace symbols of plaintext for symbols of ciphertext as dictated by the key. These techniques are relatively easy to break due to the fact that symbol frequency remains invariant. |
- | === Transposition | + | |
- | === Synchronous Stream | + | === Polyalphabetic === |
- | === Asynchronous Stream | + | === Transposition === |
+ | === Synchronous Stream === | ||
+ | === Asynchronous Stream === | ||
+ | === Steganographic === | ||
== Popular Algorithms == | == Popular Algorithms == |
Revision as of 14:46, 8 April 2008
Conventional Encryption is ...
Contents |
Classification of Ciphers
Monoalphabetic
This is a substitution technique that uses a single alphabet to replace symbols of plaintext for symbols of ciphertext as dictated by the key. These techniques are relatively easy to break due to the fact that symbol frequency remains invariant.
Polyalphabetic
Transposition
Synchronous Stream
Asynchronous Stream
Steganographic
Popular Algorithms
References
[1] Identity 2.0 Keynote Sxip Identity Video
[2] Identity 2.0 Wikipedia.org
External Links
Elian April 8/2008