From a scientific theoretical construct, cryptanalysis is nothing more than the study of cryptographic systems in order to find weaknesses in the systems and break their security without the knowledge of secret information, it is important to note that the methods and techniques of cryptanalysis come from cryptoscience.
Fig. 2 The methods and techniques of cryptanalysis are derived from cryptoscience. Image of public domain, Author: Geralt, 2017
Cryptoscience is understood as the scientific segment that studies algorithms, protocols, and each of the systems used to protect valuable information, with the purpose of conferring greater security to the growing flow of communications and exchange of documents and data.
While assigning keys, encrypting (hiding the content of a message from the naked eye), designing codes using mathematical algorithms are an integral part of our lives, and especially for those of us who make use of the web 3.0, it is important to emphasize that these methods were devised by Julius Caesar, military leader, politician and dictator of the last era of the Roman Republic.
According to ethnographic scientific reports, after Julius Caesar reached the peak of power and became the key figure of the Roman Empire, in order to keep secrets for a while, he invented the shift cipher, basically this method devised by Julius Caesar was a simple substitution cipher, which consisted of replacing all the letters by other letters of the alphabet.
Fig. 3 The method devised by Julius Caesar was a simple substitution cipher, which consisted of replacing all the letters with other letters of the alphabet. Image of public domain, Author: Terimakasih0, 2017
After displacement encryption, an infinite number of encryption methods emerged, including the cryptographic technique of the Spartans, Freemason encryption, among others of lesser or equal relevance up to our sophisticated computational methods and the creation of keys by means of the computer cryptosystem.
BIBLIOGRAPHICAL REFERENCES CONSULTED:
[1] Onwutalobi A Overview of Cryptography. SSRN Electronic Journal. 2011. Article: Online access
[2] Chandrasekhar R Cryptography and network security lecture notes. Article: Online access
hello @lupafilotaxia ,
it is interesting that they are currently working on building quantum computers capable of solving problems and decrypting encrypted files, it is said that in the next few years these pc's will be able to reveal any encrypted file making this practice obsolete.
Downvoting a post can decrease pending rewards and make it less visible. Common reasons:
Submit
Hello friend Juan
First of all thank you for your kind visit to the blog, I have certainly heard about quantum computers and the potential ability they will have to solve problems and decrypt encrypted files, we are at the beginning of the advances in quantum matters.
Best regards, be well.
Downvoting a post can decrease pending rewards and make it less visible. Common reasons:
Submit
Analysis is very important in life. Whether it is in science or technology. And this is something new concept I have heard about I will definitely check about this and get some knowledge.
Downvoting a post can decrease pending rewards and make it less visible. Common reasons:
Submit
Hello @adityajainxds
Right encrypting and encrypting messages is of vital importance for life, this because transforming a message can mean stability of organic and inorganic systems, thank you for leaving your positive comment, good that the article is useful for you.
Best regards, be well.
Downvoting a post can decrease pending rewards and make it less visible. Common reasons:
Submit