Classical Cryptography: Substitution Ciphers: Information Security
have a history of at least 4000 years 3100 B.C ancient Egyptians enciphered some of their hieroglyphic writing on monuments ancient Hebrews enciphered certa...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in South Korea under the topic 'cybersecurity news today'.
About this video
have a history of at least 4000 years
3100 B.C ancient Egyptians enciphered some of their hieroglyphic writing on monuments
ancient Hebrews enciphered certain words in the scriptures
100 BC years ago Julius Ceasar used a simple substitution cipher, now known as the Caesar cipher
1200: Roger Bacon described several methods
1392: Geoffrey Chaucer included several ciphers in his works
1460s: Leon Alberti devised a cipher wheel, and described the principles of frequency analysis
1553: Vigenère invented by Giovan Batista Belaso
1585: Blaise de Vigenère published a book on cryptology, and described the polyalphabetic substitution cipher
If you like IQPOP please SHARE, LIKE COMMENT, AND SUBSCRIBE to this CHANNEL.
The lecture is recorded to help you. For new video Kindly recommend topics in the comment box.
Video Information
Views
136
Total views since publication
Likes
1
User likes and reactions
Duration
46:59
Video length
Published
Jan 23, 2021
Release date
Quality
hd
Video definition
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
#python #programming #scientific computing #machine learning #deep learning #compute #how to #DIY #tutorial #guide #install #learn to program #code for beginners tutorial #lecture #assignment #“computer laboratory” computer science GATE #DBMS #FLAT #TOC #LATEX #SQL #information security #network security #cyber security #cryptography #encryption #decryption #IDS #intrusion detection #public key #private key #RSA #ECC #AES #DES #SHA #Access control #AI #ML #crypto system #cyber attack #security
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.