** Date**: October 11, 2013

- Cryptography and cryptanalysis
- What it does
- When it is used
- Basic assumptions

- Terms
- Ciphers and codes
- Plaintext, ciphertext, key
- Code book
- Encipher, decipher
- Adversary

- Types of attacks
- Ciphertext only — given ciphertext, find plaintext and/or key
- Known plaintext — given plaintext and corresponding ciphertext, find key
- Chosen plaintext — given the ability to select a plaintext and get the corresponding ciphertext, find the key

- Types of cipher transformations
- Substitution ciphers
- Transposition ciphers
- Product ciphers
- Superencipherment

- A brief history
- Classical cryptography
- Simple substitution
- Cæsar cipher; example, with key ‘D’ (3), RENAISSANCE → UHQDLVVDQFH

You can also obtain a PDF version of this. | Version of October 10, 2013 at 8:33PM |