Scytale Cipher Encryption - CISSP
------------------------------------------------------------------------------------------------------
Scytale Cipher Encryption
--------------------------------------------------------------------------------------------------------
The ancient Egyptians and Greeks, particularly the Spartans used the Scytale cipher to encrypt messages. It was a simple transposition cipher that could be cracked fairly easily but in the heat of battle would have been useful. The key was the diameter of the "stick" had to be identical for the code to work. For this demo I'm using a glass and a can of paint, but you get the idea.
Видео Scytale Cipher Encryption - CISSP канала A Guy
Scytale Cipher Encryption
--------------------------------------------------------------------------------------------------------
The ancient Egyptians and Greeks, particularly the Spartans used the Scytale cipher to encrypt messages. It was a simple transposition cipher that could be cracked fairly easily but in the heat of battle would have been useful. The key was the diameter of the "stick" had to be identical for the code to work. For this demo I'm using a glass and a can of paint, but you get the idea.
Видео Scytale Cipher Encryption - CISSP канала A Guy
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
ISO 27001 and 27002 Basic Summary - CISSP - Security and Risk ManagementPrivacy - CISSP - Security and Risk ManagementCISSP - Learning Through Teaching - IntroductionSecurity Fails - Voting Systems With Remote Access SoftwareRPO vs RTO - CISSP - Security OperationsLegal Aspects of Investigations - Evidence Integrity - CISSP - Security and Risk ManagementSecurity Fails - It Seems United Healthcare Wants Someone To Steal My IdentityBlack Box vs. White Box or Gray Box Testing - CISSP - Security Assessment and TestingSecurity Fails - A One Character Password?!?Legal Aspects of Investigations: Evidence Types - CISSP - Security and Risk ManagementInternational Cooperation - CISSP - Security and Risk ManagementCALEA - CISSP - Security and Risk ManagementNon-Interference Model - CISSP - Security EngineeringSimplex vs Half Duplex vs. Full Duplex - CISSP - Communications and Network SecurityThe Key To A Successful Cyber Security Career Part IIMajor Legal Systems [CISSP - Security and Risk Management]Biba Model - CISSP - Security EngineeringCriminal, Civil and Administrative Law - CISSP - Security and Risk ManagementUnited States Breach Notification Laws - CISSP - Security and Risk ManagementUnit, Regression, Acceptance Testing - CISSP - Communications and Network SecurityWired Says Free Public WIFI Is Now Okay