Thursday, November 1, 2012

Hebrews used a simple substitution cipher atbaš reverse. This encryption method is first replaced t


The ancient Chinese

used a simple code (in the file Tching Wu-tsu jao from the 11th century. Pr. BC in words. Translation Based on the classic warfare) in which 40 open message associated with the code words taken from one poem, for example. application telex air 3000 of bows and arrows could for encrypted read "Oh how beautiful is the rose bud."
Hebrews used a simple substitution cipher atbaš reverse. This encryption method is first replaced telex air 3000 with the last letter of the alphabet, telex air 3000 the second penultimate etc. and vice versa. Atbaš name is derived from the fact that the first letter of the Hebrew alphabet aleph is replaced with the last letter tav, the second bet is replaced penultimate sin. Manifestations of this encryption can also be found in the Old Testament. See Jeremiah

25, 26 and 51, 41 In Hebrew literature, known like the other two substitutions: albam and atbah.

[Http://home.ecn.ab.ca/ ~ jsavard / crypto / jscrypt.htm]
In ancient Greece, Sparta used in the first known mechanical devices to encrypt - rendered. Spartan strategists use it for military expeditions. The encryptor has shaped wooden cylinder, to which the stripe for stripe next to each wound strip of papyrus, parchment or leather. The report is printed by direction from one end of the cylinder to the other, until it fills the entire papyrus. Then strip unwound. The report, it did not make sense, unless the recipient nenamotala the same rough cylinder, because the letters were messed up (transposed). This system describes the Greek historian Plutarch.
The Roman commander Aeneas Tacticus in his writings on the strength of the defense, in XXXI. part called secret report recommends using about 22 encryption keys distributed to a substitution cipher transpozíciu.Tacticus further describes stone with 24 holes to match the 24 letters of the Greek alphabet. telex air 3000 With this stone is to encrypt the message, telex air 3000 the letters gradually prevliekala thread corresponding holes of the stone. telex air 3000
In India, the use substitution character after the letter to them phonetically príbuzné.V classic work on statecraft and diplomacy, intelligence telex air 3000 Arthro-Sastre, which is priprisované Kautilijovi

not only indicate that India literally teemed with spies, but explicitly encourages the use of secret font . Even recommends telex air 3000 Ambassador lúštiť secret inscriptions on paintings and reveal invisible ink.
The Greek historian Polybius (210-120 pr. Kr) describes so. Polybiov square (torch telex). It was probably first used by virtually "telegraphic code" to allow messages vysielaťaj be negotiated beforehand. It was based on the following table: telex air 3000
Broadcast telex air 3000 took place after the letters so that a visible place behind two opaque telex air 3000 panels telex air 3000 fakľonosiči who after starting the standby signal reception began "broadcasting". And so, the first over the left panel appeared telex air 3000 many torches, what is the serial number of the column in which the broadcast first letter, and then appeared above the right panel, the number of torches, corresponding to the number of its line. This will also broadcast the second letter, third, telex air 3000 etc.
The Roman historian Titus Livius (lived 59 years in pr. Až17 AD AD) describes almost unknown udalosťzo life great warrior Hannibal (246-183 pr. BCE). He says he sent a messenger from Italy to Carthage with an encrypted message. But the use of encryption does not specify further.
Julius Caesar (100-44 BC) used a simple substitution cipher that bears the name after him. Used several Caesar cipher but the book (the authored Valerius Probus), where described, has not been preserved. The Caesar cipher each letter is replaced by the letter that lies in alphabetical order, followed by three letters. To encrypt eg. TY statement telex air 3000 AJ BRUTUS, get cipher DM WB EUXWXV. At that time it was practically indecipherable cipher, simple and effective, until you betray Cicero, telex air 3000 who went to the camp of Caesar's opponents.
Vátsajánovo masterpiece of erotic Kama Sutra, including the two secret letters (in the order of 44 and 45) from a total of 64 arts (yogas) that a woman has to know and use. One system is called Mlechita-vikalpa and compiled it Muladeviya.


The basic steganografické methods, namely the method in which the sender and the recipient tries to conceal itself from unauthorized persons transferring telex air 3000 information included has always been sympathetic or use invisible ink. The invisible ink mentions in 2 pr. AD in his work Ars Amatore (Art of Love), the Roman poet Ovid (43 BC-18 pr.nl). Gaius Plinius Secundus commonly known as Pliny the Elder (23-79) described in his book Naturalis historia telex air 3000 extensive, use of milk spurge as invisible ink [Singh, p.20]
In Persia sa cryptography used for political purposes (unlike Greece or Rome, where it was typically military affairs). Persian kings and pr

No comments:

Post a Comment