Загрузка страницы

Showing the Oldest Printed Book on Cryptography: Trithemius‘ „Polygraphiae“ and www.cryptobooks.org

#cryptology, #cryptography, #cryptanalysis

In this other kind of video, I present another project that I am currently working on – besides CrypTool 2 :-)
www.cryptobooks.org is an online bibliography of literature about cryptography. Together with Tobias Schrödel I maintain this online bibliography. Our goal is to collect information (and pictures!) about historic books about cryptography.

In this video, I present our cryptobooks webpage and also show the oldest (and first) printed book about cryptography: Trithemius' "Polygraphiae libri sex". Also, Tobias and I are always searching for information on books, pictures, etc. So if you have these, contact us, thus, we can upload these to the database. A last word: cryptobooks.org is a free and open database for everyone interested in the fascinating topic of (historic) cryptology.

I also use this video as a first test of my greenscreen and my new camera. So please be gentle. I know the recording quality and lightning is not the best (yet), but it is a first start... maybe in future videos, I will also use the green screen and camera to show my face :-)

One note: I mispronounce the last shown book of Gaspar Schott in this video (as I always do with this book title :-) ). It is not "Schola Steganographia" but "Schola SteganographiCa" (with a "C").

One final note: Trithemius presented in "Polygraphiae" his "tabula recta" (which comprises of shifted alphabets), which I do not show in this video. In fact, this is used for his so-called "Trithemius cipher", which is a polyalphabetic substitution cipher (comparable to the Vigenère cipher, but without a key). In one of the next videos on the channel I will discuss this Trithemius cipher in detail ;-)

Link to cryptobooks: https://www.cryptobooks.org

Link to "Polygraphiae": https://cryptobooks.org/book/92

Some other stuff on the channel you might be interested in:

If you are interested in learning more about cryptology, I suggst you have a look "Basics of Cryptology" series. Use this playlist: https://www.youtube.com/playlist?list=PLMuvAbyIl0PT6zaRVpK0FCSNMgwAOckTt

If you are interested in details about CrypTool 2, our e-learning tool for cryptology, you may have a look at this video here, which gives a short introduction: https://www.youtube.com/watch?v=dELT2-Vgsr8&t=853s

Finally, you may download the latest version of CrypTool 2 here: https://www.cryptool.org/en/ct2/downloads

Видео Showing the Oldest Printed Book on Cryptography: Trithemius‘ „Polygraphiae“ and www.cryptobooks.org канала Cryptography for Everybody
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
20 ноября 2020 г. 22:56:43
00:22:25
Другие видео канала
Zodiac Killer Ciphers – Let's have a Look at Unicity Distances With ExcelZodiac Killer Ciphers – Let's have a Look at Unicity Distances With Excel10 -  Automatic Translation of CrypTool 2 To a New Language10 - Automatic Translation of CrypTool 2 To a New Language04 - Internationalization of the Component (CrypTool 2 Development Series)04 - Internationalization of the Component (CrypTool 2 Development Series)My Cryptologic Highlights of 2020My Cryptologic Highlights of 2020Crypto Challenge Contest – Video 1Crypto Challenge Contest – Video 1Basics of Cryptology – Part 2 (Cryptanalysis – Terminology & Classical Ciphers)Basics of Cryptology – Part 2 (Cryptanalysis – Terminology & Classical Ciphers)Enigma Machine – Part 1 of 2 – How does it work?Enigma Machine – Part 1 of 2 – How does it work?Basics of Cryptology – Part 20 (Cryptanalysis – Cost & Fitness Functions - Language Models)Basics of Cryptology – Part 20 (Cryptanalysis – Cost & Fitness Functions - Language Models)Digital File Signatures – How Do They Protect Your Computer?Digital File Signatures – How Do They Protect Your Computer?How Morse Code Works – A Code From the 19th Century Which Is Still Used TodayHow Morse Code Works – A Code From the 19th Century Which Is Still Used TodayBasics of Cryptology – Part 22 (Cryptography – Kerckhoffs' Principle & Modern Cryptographic Goals)Basics of Cryptology – Part 22 (Cryptography – Kerckhoffs' Principle & Modern Cryptographic Goals)Let's Decipher a Letter of the Silent Film Star Mary Miles Minter That Lead to a ScandalLet's Decipher a Letter of the Silent Film Star Mary Miles Minter That Lead to a ScandalBasics of Cryptology – Part 9 (Modern Cryptography – Block Ciphers – Feistel Ciphers & SDES)Basics of Cryptology – Part 9 (Modern Cryptography – Block Ciphers – Feistel Ciphers & SDES)The Straddling Checkerboard Cipher ExplainedThe Straddling Checkerboard Cipher ExplainedLet's Decipher Two Encrypted English Postcards – Secret Messages From the Past RevealedLet's Decipher Two Encrypted English Postcards – Secret Messages From the Past RevealedLet's Break My Self-Made Cryptographic Challenges From HistoCrypt 2019Let's Break My Self-Made Cryptographic Challenges From HistoCrypt 2019Basics of Cryptology – Part 23 (Cryptography – Modern Hybrid Encryption)Basics of Cryptology – Part 23 (Cryptography – Modern Hybrid Encryption)Break an Encrypted Letter of a Child KillerBreak an Encrypted Letter of a Child KillerBasics of Cryptology – Part 17 (Cryptography/Cryptanalysis – Keyspace and Keyspace Size)Basics of Cryptology – Part 17 (Cryptography/Cryptanalysis – Keyspace and Keyspace Size)An Encrypted Description of a Secret Magic Machine in an 18th Century Alchemy BookAn Encrypted Description of a Secret Magic Machine in an 18th Century Alchemy BookLet's Program a Hash Preimage Searcher to Break PasswordsLet's Program a Hash Preimage Searcher to Break Passwords
Яндекс.Метрика