{"id":114679,"date":"2023-08-22T10:09:50","date_gmt":"2023-08-22T10:09:50","guid":{"rendered":"https:\/\/learnexams.com\/blog\/?p=114679"},"modified":"2023-08-22T10:09:51","modified_gmt":"2023-08-22T10:09:51","slug":"summary-wgu-c839-introduction-to-cryptography-ec-council-ces","status":"publish","type":"post","link":"https:\/\/www.learnexams.com\/blog\/2023\/08\/22\/summary-wgu-c839-introduction-to-cryptography-ec-council-ces\/","title":{"rendered":"Summary WGU C839 Introduction to Cryptography &#8211; (EC-Council CES)"},"content":{"rendered":"\n<p>1 \/ 20<br>WGU C839 Introduction to Cryptography &#8211; (EC-Council CES)<br>1.CrypTool: Software which allows encryption of text using historic<br>algorithms<br>2.The Enigma Machine: In World War II the Germans made use of an<br>electro-me- chanical rotor based cipher Known as The Enigma<br>Machine.<br>Allied cipher machines used in WWII included the British TypeX and the<br>American SIGABA.<br>3.The ADFGVX Cipher: invented by Colonel Fritz Nebel in 1918.<br>The key for this algorithm is a six-by-six square of letters, used to<br>encode a 36-letter alphabet.<br>4.The Playfair Cipher: invented in 1854 by Charles Wheatstone.<br>The Playfair cipher uses a five-by-five table containing a keyword or<br>key phrase.<\/p>\n\n\n\n<p>2 \/ 20<br>5.Breaking the Vigene re Ciph:eIrn 1863, Friedrich Kasiski was the first<br>person to publish a successful general attack on the Vigene re<br>Cipher<br>6.The Vigene re Ciph:eTr his is perhaps the most widely known multialphabet substitution cipher. invented in 1553 by Giovan Battista<br>Bellaso. Uses a series of different Caesar ciphers based on the letters<br>of a keyword.<br>7.The Cipher Disk: The cipher disk was invented by Leon Alberti in<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"1466\">\n<li>each time you turned the disk, you used a new cipher. It was<br>literally a disk you turned to encrypt plaintext.<br>8.Multi-Alphabet Substitution: Use of multiple substitution<br>alphabets. Example:Cipher Disk, Vigenere Cipher, Enigma<br>Machine<br>9.Scytale: This was a cylinder tool used by the Greeks, and is often<br>specifically attributed to the Spartans. Physical cylinder that was used<br>to encrypt messages.<br>10.ROT13 Cipher: It is essentially the Caesar cipher always using a<br>rotation or shift of 13 characters.<br>11.The ATBASH Cipher: Hebrew scribes copying religious texts used<br>this cipher. substitutes the first letter of the alphabet for the<br>last, and the second letter for the second-to-the-last, etc.<\/li>\n<\/ol>\n\n\n\n<p>3 \/ 20<br>12.The Caesar Cipher: You can choose to shift any number of letters,<br>either left or right. If you choose to shift two to<br>the right, that would be a +2; if you choose to shift four to the left, thatwould be a<br>-4.<br>13.Mono-Alphabet Substitution: These algorithms<br>simply substitute one character of cipher text for each character of<br>plain text.<\/p>\n\n\n\n<p>4 \/ 20<br>Examples: Atbash Cipher, Caesar Cipher, Rot13<br>14.Symmetric Cryptography: It is simply any algorithm where the key<br>used to decrypt a message is the same key used to encrypt.<br>15.Diffusion: Changes to one character in the plain text affect multiple<br>characters in the cipher text.<br>16.Confusion: Confusion attempts to make the relationship between<br>the statisti- cal frequencies of the cipher text and the actual key as<br>complex as possible. This occurs by using a complex substitution<br>algorithm.<br>17.Avalanche: a small change yields large effects in the output, This is<br>Fiestel&#8217;s variation on Claude Shannon&#8217;s concept of diffusion.<br>18.Kerckhoffs&#8217;s Principle: This principle states that a cryptosystem<br>should be secure even if everything about the system, except the<br>key, is publicly known.<br>19.Substitution: Substitution is changing some part of the plaintext<br>for some matching part of the Cipher Text.<br>20.Transposition: Transposition is the swapping of blocks of ciphertext.<br>21.binary numbers: there are three operations not found in<br>normal math: AND, OR, and XOR operations.<br>22.Binary AND: If both numbers have a one in both places, then the<br>resultant number is a one.<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>1 \/ 20WGU C839 Introduction to Cryptography &#8211; (EC-Council CES)1.CrypTool: Software which allows encryption of text using historicalgorithms2.The Enigma Machine: In World War II the Germans made use of anelectro-me- chanical rotor based cipher Known as The EnigmaMachine.Allied cipher machines used in WWII included the British TypeX and theAmerican SIGABA.3.The ADFGVX Cipher: invented by Colonel [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[25],"tags":[],"class_list":["post-114679","post","type-post","status-publish","format-standard","hentry","category-exams-certification"],"_links":{"self":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/114679","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/comments?post=114679"}],"version-history":[{"count":0,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/114679\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/media?parent=114679"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/categories?post=114679"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/tags?post=114679"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}