![]() ![]() ![]() Most interesting was the cipher “atbah”, where the first 9 letters marked with numbers from one to nine and replaced with that matched the numbers add to 10 Another 9 letters were similarly encrypted, but was determined to supplement the Hebrew number 100 (in decimal system 28). Nowadays, this corresponds to the substitution A = N, B = O, C = P, etc. Cipher “Albam” alphabet divided into two halves and the first character of the first half of the match the first character of the second half. Nowadays, this corresponds to the substitution A = Z, B = Y, C = X, etc. ![]() The Cipher “Atbash” was the first letter of the alphabet replaced the last, second-last, etc. It concerns three types of ciphers known as “Atbash”, “Albums” and “atbah”. Hebrew masters and scholars were the first to use simple cipher based on substitution. The oldest surviving work from about 1500 BC is a small clay tablet on which the hidden secrets of the glaze on ceramic vessels. In ancient Mesopotamia, instead of encryption used simple methods rather reminiscent of confidentiality Steganography. Written messages are not encrypted, but packed into a ball, covered in wax and then hidden in the body of the messenger. Among the captains and higher-ranking people were more preferred oral communication, when the messenger had to learn the text by heart and repeated communication to the addressee in person. This was due to a very low level of education of the population. In ancient China was not enhanced encryption. In India were also created basics of sign language, which is still used by deaf people and traders. The first is “kauţiliyam” and the second “m-ladejiya”. This yoga is called “mlecchita-vikalpa” and is divided into two ways. In famous book – Kamasutra from the author is described Vatsyanova Art “Making sense of the scriptures secret and secret characters” at the 43rd place between 64 arts (ie yoga), which every woman should learn in order to protect confidential and sensitive information from unauthorized disclosure person. Later the word was used to refer to figure all used numbers as we know it today. In the 15th and 16 century, the role of the mysterious numbers zero at entry led to the fact that the code word was used to describe the mysterious and unknown things. From Latin to French, the word translated as chiffre figure. When translated into Latin, it was translated as zephirium, figure or also figure nihil. Originally it was the Arabic word sifr as indicating numeral zero. In ancient India, indirectly origin and the word cipher. These hieroglyphs are the oldest surviving example of the use of the transformation of the text. For example, instead of writing AD 2010 was used text “year of our Lord two thousand and tenth.” In a way, the encryption and the use of common hieroglyphs, because most of the population could neither read nor write. It is therefore not directly cipher that would hinder reading of the text, but the florid decoration written (in this case, engraved) text. A special feature of this method is that commonly used hieroglyphics were replaced with new ones that should exaggerate the importance of the acts of the master. This act began the history of cryptology. In about 1900 BC in Egypt in Menet Khufu unknown master carved into the stone plates hieroglyphics depicting the life of his master. ![]() Cipher formed in isolation in different parts of the world, some lasted a long time, and others survived extinction civilization that created them. Cryptology initially developed very unevenly. This has led some four thousand years ago that people started their reports differently camouflage and concealment – was secret communication and the first crude ciphers. But sometimes we cannot allow our communication being watched. The need for people to interact with each other is as old as humanity itself. Also listed are enunciated and most important events and data related to cryptography and cryptanalysis. The text explains the basic principles of using simple ciphers to encrypt a short demonstration of text or an image for a better understanding of how the code worked. The work is divided chronologically by time of occurrence or discovery of the cipher (with a few exceptions due to consistency origin ciphers), but also depending on which part of the world appeared cipher, or where the code was extended and used. The article provides a brief summary of the history of cryptology from the simplest methods of hiding codes and relevant message, in ancient times, when people began their correspondence secret, to some modern encryption algorithms currently used in the field of information technology, but also in other areas of human knowledge. This article seeks to familiarize the reader with the history of cryptology from the first efforts of secret messages to the current use of ciphers to communicate in the world of information technology. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |