Tuesday, August 28, 2018

Questioned Documents: Secret Writing

Secret Writing: Cryptography, Encrypt- Decrypt, Steganography
All the way through history, military had used secure communications through encryption of the data. It was in 1980’s that the need for secure commercial and private communications had grown under the name of the Information Age. Internet and the World Wide Web is a platform that allows community to correspond information, mail and commerce in a digital medium. This has caused in an augment in the need for information security.
Historical Cryptography
  • Ancient Egypt
  • Greece
  • Rome
  • Alberti- Vigenere Cipher
  • Jefferson Wheel Cipher

War Driven Cryptography- WWI
  • Zimmerman Telegram
  • Choctaw Codetalkers

War Driven Cryptography- WWII
  • Enigma Encryption Machine
  • Purple

 Modern Encryption- Part 1
  •  One-time Pad
  • Pseudo-Random Number Generator
  • Symmetric Key Encryption (Private-Key)
Modern Encryption- Part 2
  • Asymmetric key Encryption (Public-Key)
  • Diffie-Hellman Key Exchange
  • RSA Encryption

Steganography

Let us learn about all this in detail through this video lecture.



No comments:

Post a Comment