Pseudo-Random Number Generators (PRNGs)
True Random Number Generators (TRNGs)
8-bit values, up to 256 characters
ASCII
16- bit values, up to 65,536 characters
UTF-16
Secret Key encryption is needed for…
symmetric cryptography; makes use of a single secret key for both encryption and decryption.
What specific algorithm is used in asymmetric cryptography overcome the weakness of symmetric cryptography through secret key encryption?
Diffie-Hellman is a widely used key exchange algorithm used to exchange the secret key in symmetric cryptography.
Aescrypt
encrypts individual files
Bitlocker
encrypts full disks
FileVault
encrypts full disks
Pseudo-Random Number Generators (PRNGs)
* They are fast deterministic and are useful in producing a repeatable set of random numbers.
True Random Number Generators (TRNGs)
•This method generates a true random number and uses some form of random
process.
•Overall, the method is generally slow, but is non-deterministic and aperiodic.
Vigenere
Playfair
Pigpen
* maps the letters into numeric values.
BIFID
Rail Fence (Zig-Zag)
homophonic substitution code
Four-square Cipher
extension of BIFID?
Enigma Machine
Affine Cipher
ADFVGX Cipher
* Turning produced different ciphertexts.
Cipher Disk
Examples of poly-alphabetic ciphers
Vigenere
Cipher disk
Enigma machine