Conventional Encryption Algorithms

From Computing and Software Wiki

(Difference between revisions)
Jump to: navigation, search
Line 18: Line 18:
[2] [http://en.wikipedia.org/wiki/Identity_2.0/ Identity 2.0] Wikipedia.org
[2] [http://en.wikipedia.org/wiki/Identity_2.0/ Identity 2.0] Wikipedia.org
 +
 +
== External Links ==
[http://www.ling.ohio-state.edu/~cbrew/2008/winter/484/monoalphabetic.pdf Monoalphabetic Ciphers]
[http://www.ling.ohio-state.edu/~cbrew/2008/winter/484/monoalphabetic.pdf Monoalphabetic Ciphers]
-
[[User:Angiusei|Elian]]
+
[[User:Angiusei|Elian]] April 8/2008

Revision as of 14:45, 8 April 2008

Conventional Encryption is ...

Figure 1: Flow Diagram

Contents


Classification of Ciphers

Monoalphabetic Ciphers

Polyalphabetic Ciphers

Transposition Ciphers

Synchronous Stream Ciphers

Asynchronous Stream Ciphers

Popular Algorithms

References

[1] Identity 2.0 Keynote Sxip Identity Video

[2] Identity 2.0 Wikipedia.org

External Links

Monoalphabetic Ciphers


Elian April 8/2008

Personal tools