Posts

All you need to know about Ciphers

Image
Monomial Cipher Monomial Ciphers are ciphers whose alphabetical substitution does not change throughout the encrypted data. eg: If A=V. Then it will be the same throughout the cipher. Without any numbers. PS. There are no numbers in a monomial cipher. Polynomial Cipher There are two types of polynomial ciphers: Letter type Number type Letter type polynomials don't remain the same throughout the encrypted data. They change on the basis of a key. Eg: Key: KEY K: A-K       E: A-E      Y: A-Y          B-L...        B-F...        B-Z... Number type polynomials are very complex. They are based on numbers, of course. Please refer to  The Binary Code to understand completely. Since binary is a base 2 system, the 1's and 0's refer to distinct alphabets in the English language. They then encode themselves automatically to be in 1 and 0 form. Then ...

Java Antivirus

Image
This is the logo of Java Antivirus Java Antivirus is an Antivirus software designed by Sun Microsystems and  Oracle Corporation that offers high security than any other Antivirus software. As of 2017, both Java Antivirus 8 and 9 are officially supported. Major release versions of Java Antivirus, along with their release dates: JAV 1.0:          (January 23, 1996) JAV 1.1:          (February 19, 1997) J2AV 1.2:        (December 8, 1998) J2AV 1.3:        (May 8, 2000) J2AV 1.4:        (February 6, 2002) J2AV 5.0:        (September 30, 2004) Java AV 6:      (December 11, 2006) Java AV 7:      (July 28, 2011) Java AV 8:     (March 18, 2014) Java AV 9:      (September 21, 2017) If you Google for Java Antivirus you wouldn't get the results as it's not Open Source Software....

One-time pad

Image
A format of one-time pad used by the U.S. National Security Agency , code named DIANA. The table on the right is an aid for converting between plaintext and ciphertext using the characters at l eft as the key. In crytography , the  one-time pad  ( OTP ) is an  encryption  technique that cannot be  cracked , but requires the use of a one-time pre-shared key the same size as, or longer than, the message being sent. In this technique, a  plaintext  is paired with a random secret  key  (also referred to as  a one-time pad ). Then, each bit or character of the plaintext is encrypted by combining it with the corresponding bit or character from the pad using  modular addition . If the key is truly  random , is at least as long as the plaintext, is never reused in whole or in part, and is kept completely  secret , then the resulting  ciphertext  will be impossible to decrypt or break.   It has also been proven t...

Binary Code

Image
This is the International Binary Code 01000011 01101111 01100100 01100101 00100000 01001100 01100001 01100010 01110011 Code Labs A  binary code  represents  text ,  computer processor instructions , or other  data  using any two-symbol system, but often the  binary number system 's 0 and 1. The binary code assigns a pattern of binary digits ( bits ) to each character, instruction, etc. For example, a binary  string  of eight bits can represent any of 256 possible values and can therefore represent a variety of different items. In computing and telecommunications, binary codes are used for various methods of encoding  data, such as character strings , into bit strings. Those methods may use fixed-width or variable-width  strings. In a fixed-width binary code, each letter, digit, or other character is represented by a bit string of the same length; that bit string, interpreted as a binary number , is usually displayed in ...

International Morse Code

Image
This is the International Morse Code, a famous type of code. Morse code  is a method of transmitting text  information as a series of on-off tones, lights, or clicks that can be directly understood by a skilled listener or observer without special equipment. It is named for Samuel F. B. Morse , an inventor of the telegraph. The International Morse Code  encodes the ISO basic Latin alphabet , some extra Latin letters, the A rabic numerals  and a small set of punctuation and procedural signals (prosigns ) as standardized sequences of short and long signals called "dots" and "dashes",  or "dits" and "dahs", as in  amateur radio  practice. Because many non-English natural languages use more than the 26 Roman letters, extensions to the Morse alphabet exist for those languages.