Back to Results
First PageMeta Content
Substitution cipher / Cryptanalysis / Caesar cipher / Classical cipher / Playfair cipher / Block cipher / Symmetric-key algorithm / Hill cipher / Transposition cipher / Cryptography / Cipher / Vigenère cipher


Lecture 2: Classical Encryption Techniques Lecture Notes on “Computer and Network Security” by Avi Kak ([removed]) January 20, 2015 9:44pm c
Add to Reading List

Document Date: 2015-04-19 11:00:38


Open Document

File Size: 308,20 KB

Share Result on Facebook

/

Facility

Building Blocks / BUILDING BLOCKS OF CLASSICAL ENCRYPTION TECHNIQUES / /

IndustryTerm

decryption algorithm / confidential communications / mod operator / ciphertext encryption algorithm / typical inter-bank financial transaction / ciphertext decryption algorithm / civilian applications / data processing steps / encryption algorithm / internet communications / decryption algorithms / cryptographic algorithms / /

Organization

Purdue University / /

Person

CAESAR CIPHER / Avinash Kak / Avi Kak / /

ProgrammingLanguage

Python / /

Technology

Encryption / block cipher / BASIC VOCABULARY OF ENCRYPTION / cryptography / secret key / public key / decryption algorithm / ciphertext encryption algorithm / decryption algorithms / encryption algorithm / Avi / stream cipher / ciphertext decryption algorithm / /

URL

http /

SocialTag