Presentation is loading. Please wait.

Presentation is loading. Please wait.

Yizhou Wang.  Techniques for secure communication in the presence of third parties.  It is about constructing and analyzing protocols that overcome.

Similar presentations


Presentation on theme: "Yizhou Wang.  Techniques for secure communication in the presence of third parties.  It is about constructing and analyzing protocols that overcome."— Presentation transcript:

1 Yizhou Wang

2  Techniques for secure communication in the presence of third parties.  It is about constructing and analyzing protocols that overcome the influence of adversaries and which are related to various aspects in information security.

3 Simple Design  Changing the order of words, letters  Backwards English EES UOY TA EHT EROTS. Answer: See you at the store.  Lumping Words IBETTHISISHARDFORMANYPEOP LE. Answer: I bet this is hard for many people.

4 * Alphabet Substitution

5  Alphabet Wheel The plain alphabet in the inside the circle and the cipher alphabet on the outside.  Letter Spokes Cipher Clock Take each letter in the wheel and line it up with another letter somewhere else in the wheel.

6 * "IL fvbyzlsm; lclyfvul lszl pz hsylhkf ahrlu. " - Vzjhy Dpskl Hint: L=E * Answer: " Be Yourself; Everyone Else is Already Taken. " - Oscar Wilde

7  Compass Cipher Make a cross and write out the letters of the alphabet along each line, spiraling outwards.

8 * https://www.google.com/search?q=Alphabet+Wheel&rlz=1C1CHFX_enUS517US522&espv=2&tb m=isch&tbo=u&source=univ&sa=X&ei=uI6PU4mwNIiMqgbkw4Aw&ved=0CB8QsAQ&biw=1366&bih =643 https://www.google.com/search?q=Alphabet+Wheel&rlz=1C1CHFX_enUS517US522&espv=2&tb m=isch&tbo=u&source=univ&sa=X&ei=uI6PU4mwNIiMqgbkw4Aw&ved=0CB8QsAQ&biw=1366&bih =643 * https://www.google.com/search?q=Compass+cipher&rlz=1C1CHFX_enUS517US522&espv=2&tb m=isch&tbo=u&source=univ&sa=X&ei=ioPU4eAF4aEqgaQ qoDwDg&ved=0CE0QsAQ&biw=1366&bih= 643 https://www.google.com/search?q=Compass+cipher&rlz=1C1CHFX_enUS517US522&espv=2&tb m=isch&tbo=u&source=univ&sa=X&ei=ioPU4eAF4aEqgaQ qoDwDg&ved=0CE0QsAQ&biw=1366&bih= 643 * http://en.wikipedia.org/wiki/Pig_Latin http://en.wikipedia.org/wiki/Pig_Latin * http://en.wikipedia.org/wiki/Cryptography http://en.wikipedia.org/wiki/Cryptography


Download ppt "Yizhou Wang.  Techniques for secure communication in the presence of third parties.  It is about constructing and analyzing protocols that overcome."

Similar presentations


Ads by Google