×

Science and myths's video: machine The era of cryptography Ancient to modern cryptography

@जानिए कैसे इस machine ने हज़ारो जाने बचाई | The era of cryptography | Ancient to modern cryptography
The history of codes and cryptography is a fascinating topic that spans thousands of years and involves many different methods and technologies. I have wanted to write on this topic for quite some time now but couldn’t complete it due to other projects at hand. Many people on individual basis and even companies use cryptographic techniques for various reasons from protecting sensitive data and preventing espionage to enabling the creation and exchange of cryptocurrency and other digital assets. But many people have little to no idea about the evolution of codes and cryptographic systems. In this piece, we shall briefly overview some of the main phases and milestones in the development of cryptology, the science of making and breaking codes.Ancient ciphers and early encryption techniques are methods of transforming messages or information in such a way that only authorized parties can access them. They usually involve replacing or rearranging the letters or symbols of the original message with a secret key or algorithm. Here are some examples of ancient ciphers and early encryption techniques: The Caesar Shift Cipher The Caesar cipher, employed by Julius Caesar and his army during the 1st century BC, served as a means to encrypt military and official messages. Operating as a simple substitution cipher, it involved replacing each letter in the message with another letter positioned a fixed number of places away in the alphabet. For instance, with a shift of 3, ‘A’ would be substituted with ‘D’, ‘B’ with ‘E’, and so forth. The key for this cipher represented the number of positions to shift, encompassing values ranging from 1 to 25. To decipher the message, the recipient needed knowledge of the key to revert the letters to their original positions. However, the Caesar cipher was susceptible to frequency analysis, a method involving the tabulation of letter occurrences in the ciphertext and comparing them against the expected frequencies in the language, thus rendering it relatively easy to break. The Scytale Cipher The Spartans and other ancient Greeks utilized a cipher during the 7th century BC for the encryption of military and political messages. This particular cipher operated as a transposition cipher, whereby the arrangement of letters in the message was altered based on a concealed pattern. The pattern, in this case, was determined through the utilization of a cylindrical rod known as a scytale. To encrypt the message, the sender would encircle a strip of parchment or leather around the scytale and proceed to inscribe the message along its length. Subsequently, the strip would be unwrapped and dispatched to the intended recipient. For decryption, the recipient would require a scytale possessing an identical diameter to rewrap the strip around it and decipher the concealed message. This cipher’s security was compromised, as its vulnerability lay in attempting various diameters of rods until the message became intelligible, rendering it relatively easy to break. The Steganography Steganography, distinct from a cipher, represents a technique employed to conceal messages in plain sight by disguising them as something else. Its origins can be traced back to ancient times, and it has found utility across a range of endeavors encompassing espionage, propaganda, and art. Several examples of steganography include inscribing a message on a shaved head, allowing the hair to regrow and obscure the hidden text, utilizing invisible ink or microdots to convey information, and embedding messages within different mediums, such as texts, images, audio, or video files. If executed adeptly, steganography can prove challenging to detect; nevertheless, it can be exposed through meticulous scrutiny or by subjecting the medium to careful examination or analysis. The Vigenère cipher, a polyalphabetic substitution cipher that was considered unbreakable for centuries. It was invented by Giovan Battista Bellaso in 1553 and improved by Blaise de Vigenère in 1586. It was widely used by European diplomats until the 19th century. Now to know more watch out this full video till the end. Thanks for watching. Social accounts link Instagram- https://www.instagram.com/scienceandmyths/ Facebook Page- https://www.facebook.com/ScienceAndMyths/ Modern cryptography video link- https://youtu.be/4SIwyfjYMRc जानिए कैसे इस machine ने हज़ारो जाने बचाई | The war of cryptography | Ancient to modern cryptography FAIR-USE COPYRIGHT DISCLAIMER This video is meant for Educational/Inspirational purpose only. We do not own any copyrights, all the rights go to their respective owners. The sole purpose of this video is to inspire, empower and educate the viewers.

849

97
Science and myths
Subscribers
515K
Total Post
304
Total Views
7.2M
Avg. Views
73.1K
View Profile
This video was published on 2023-08-08 10:01:16 GMT by @Science-and-myths on Youtube. Science and myths has total 515K subscribers on Youtube and has a total of 304 video.This video has received 849 Likes which are lower than the average likes that Science and myths gets . @Science-and-myths receives an average views of 73.1K per video on Youtube.This video has received 97 comments which are lower than the average comments that Science and myths gets . Overall the views for this video was lower than the average for the profile.

Other post by @Science and myths