Conventional Encryption Algorithms

From Computing and Software Wiki

(Difference between revisions)
Jump to: navigation, search
Line 1: Line 1:
'''Conventional Encryption''' is ...
'''Conventional Encryption''' is ...
-
[[Image:FlowDiagram.jpg|thumb|300px|center|Figure 1: Flow Diagram]]
+
[[Image:FlowDiagram.jpg|thumb|300px|right|Figure 1: Flow Diagram]]
__TOC__
__TOC__
Line 15: Line 15:
= References =
= References =
[1] [http://www.sxip.com/videos Identity 2.0 Keynote] Sxip Identity Video
[1] [http://www.sxip.com/videos Identity 2.0 Keynote] Sxip Identity Video
 +
[2] [http://en.wikipedia.org/wiki/Identity_2.0/ Identity 2.0] Wikipedia.org
[2] [http://en.wikipedia.org/wiki/Identity_2.0/ Identity 2.0] Wikipedia.org
-
--[[User:Angiusei|Elian]]
+
[[User:Angiusei|Elian]]

Revision as of 14:31, 8 April 2008

Conventional Encryption is ...

Figure 1: Flow Diagram

Contents


Classification of Ciphers

Monoalphabetic Ciphers

Polyalphabetic Ciphers

Transposition Ciphers

Synchronous Stream Ciphers

Asynchronous Stream Ciphers

References

[1] Identity 2.0 Keynote Sxip Identity Video

[2] Identity 2.0 Wikipedia.org

Elian

Personal tools