Understanding Symmetric Cryptographic Ciphers in Discrete Math π
Explore the fundamentals of symmetric cryptographic ciphers, their role in secure message encryption, and how they have been used throughout history in this insightful lecture.

Professor Macauley
2.6K views β’ Jun 13, 2019

About this video
Discrete Mathematical Structures, Lecture 5.1: Symmetric cryptographic ciphers.
The practice of sending encrypted messages has been around since at least Julius Caesar, in the 1st century B.C. In this lecture, we look at some basic "symmetric" cryptographic ciphers, which means that the decoding function d(x) is simply the inverse e(x) of the encoding function. We begin with the Caesar cipher, which encodes messages by shifting each letter by a fixed amount. Formally, this is an encryption function e(x)=x+k (mod 26). We can makes things harder by using a general affine cipher, which uses an encryption function e(x)=ax+b (mod 26), where gcd(26,a)=1. Unfortunately, all of these can be cracked quite easily by analyzing letter frequency. So we can make things harder with a block cipher, which shifts letters by varying amounts, depending on the key, which is a short string of text. We do an example using the Vigenère cipher.
Course webpage: http://www.math.clemson.edu/~macaule/math4190-online.html
The practice of sending encrypted messages has been around since at least Julius Caesar, in the 1st century B.C. In this lecture, we look at some basic "symmetric" cryptographic ciphers, which means that the decoding function d(x) is simply the inverse e(x) of the encoding function. We begin with the Caesar cipher, which encodes messages by shifting each letter by a fixed amount. Formally, this is an encryption function e(x)=x+k (mod 26). We can makes things harder by using a general affine cipher, which uses an encryption function e(x)=ax+b (mod 26), where gcd(26,a)=1. Unfortunately, all of these can be cracked quite easily by analyzing letter frequency. So we can make things harder with a block cipher, which shifts letters by varying amounts, depending on the key, which is a short string of text. We do an example using the Vigenère cipher.
Course webpage: http://www.math.clemson.edu/~macaule/math4190-online.html
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
2.6K
Likes
24
Duration
34:15
Published
Jun 13, 2019
User Reviews
4.2
(2) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.