Download presentation
Presentation is loading. Please wait.
Published byEric Dylan Marshall Modified over 8 years ago
1
Yizhou Wang
2
Techniques for secure communication in the presence of third parties. It is about constructing and analyzing protocols that overcome the influence of adversaries and which are related to various aspects in information security.
3
Simple Design Changing the order of words, letters Backwards English EES UOY TA EHT EROTS. Answer: See you at the store. Lumping Words IBETTHISISHARDFORMANYPEOP LE. Answer: I bet this is hard for many people.
4
* Alphabet Substitution
5
Alphabet Wheel The plain alphabet in the inside the circle and the cipher alphabet on the outside. Letter Spokes Cipher Clock Take each letter in the wheel and line it up with another letter somewhere else in the wheel.
6
* "IL fvbyzlsm; lclyfvul lszl pz hsylhkf ahrlu. " - Vzjhy Dpskl Hint: L=E * Answer: " Be Yourself; Everyone Else is Already Taken. " - Oscar Wilde
7
Compass Cipher Make a cross and write out the letters of the alphabet along each line, spiraling outwards.
8
* https://www.google.com/search?q=Alphabet+Wheel&rlz=1C1CHFX_enUS517US522&espv=2&tb m=isch&tbo=u&source=univ&sa=X&ei=uI6PU4mwNIiMqgbkw4Aw&ved=0CB8QsAQ&biw=1366&bih =643 https://www.google.com/search?q=Alphabet+Wheel&rlz=1C1CHFX_enUS517US522&espv=2&tb m=isch&tbo=u&source=univ&sa=X&ei=uI6PU4mwNIiMqgbkw4Aw&ved=0CB8QsAQ&biw=1366&bih =643 * https://www.google.com/search?q=Compass+cipher&rlz=1C1CHFX_enUS517US522&espv=2&tb m=isch&tbo=u&source=univ&sa=X&ei=ioPU4eAF4aEqgaQ qoDwDg&ved=0CE0QsAQ&biw=1366&bih= 643 https://www.google.com/search?q=Compass+cipher&rlz=1C1CHFX_enUS517US522&espv=2&tb m=isch&tbo=u&source=univ&sa=X&ei=ioPU4eAF4aEqgaQ qoDwDg&ved=0CE0QsAQ&biw=1366&bih= 643 * http://en.wikipedia.org/wiki/Pig_Latin http://en.wikipedia.org/wiki/Pig_Latin * http://en.wikipedia.org/wiki/Cryptography http://en.wikipedia.org/wiki/Cryptography
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.