What science says about cryptanalysis


From a scientific theoretical construct, cryptanalysis is nothing more than the study of cryptographic systems in order to find weaknesses in the systems and break their security without the knowledge of secret information, it is important to note that the methods and techniques of cryptanalysis come from cryptoscience.

Fig. 2 The methods and techniques of cryptanalysis are derived from cryptoscience. Image of public domain, Author: Geralt, 2017

Cryptoscience is understood as the scientific segment that studies algorithms, protocols, and each of the systems used to protect valuable information, with the purpose of conferring greater security to the growing flow of communications and exchange of documents and data.

While assigning keys, encrypting (hiding the content of a message from the naked eye), designing codes using mathematical algorithms are an integral part of our lives, and especially for those of us who make use of the web 3.0, it is important to emphasize that these methods were devised by Julius Caesar, military leader, politician and dictator of the last era of the Roman Republic.

According to ethnographic scientific reports, after Julius Caesar reached the peak of power and became the key figure of the Roman Empire, in order to keep secrets for a while, he invented the shift cipher, basically this method devised by Julius Caesar was a simple substitution cipher, which consisted of replacing all the letters by other letters of the alphabet.

Fig. 3 The method devised by Julius Caesar was a simple substitution cipher, which consisted of replacing all the letters with other letters of the alphabet. Image of public domain, Author: Terimakasih0, 2017

After displacement encryption, an infinite number of encryption methods emerged, including the cryptographic technique of the Spartans, Freemason encryption, among others of lesser or equal relevance up to our sophisticated computational methods and the creation of keys by means of the computer cryptosystem.

BIBLIOGRAPHICAL REFERENCES CONSULTED:


[1] Onwutalobi A Overview of Cryptography. SSRN Electronic Journal. 2011. Article: Online access

[2] Chandrasekhar R Cryptography and network security lecture notes. Article: Online access


OBSERVATION


The cover image was designed by the author: @lupafilotaxia, incorporating the public domain image background: TheDigitalArtist, 2018


Sort:  

This post has been upvoted/supported by Team 7 via @httr4life. Our team supports content that adds to the community.

image.png

Quite the first time I will be hearing about this word and it is really quite interesting to see actually. We actually need to learn more of encrypting so that we can actually understand it much more better

Coin Marketplace

STEEM 0.20
TRX 0.19
JST 0.034
BTC 89752.15
ETH 3297.99
USDT 1.00
SBD 3.02