{"id":30637,"date":"2015-08-28T15:43:39","date_gmt":"2015-08-28T19:43:39","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/braingle-codes-ciphers-encryption-and-cryptography.php"},"modified":"2015-08-28T15:43:39","modified_gmt":"2015-08-28T19:43:39","slug":"braingle-codes-ciphers-encryption-and-cryptography","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/braingle-codes-ciphers-encryption-and-cryptography.php","title":{"rendered":"Braingle: Codes, Ciphers, Encryption and Cryptography"},"content":{"rendered":"<p><p>Codes, Ciphers, Encryption and Cryptography    <\/p>\n<p>    Cryptography is the discipline of using codes and ciphers to    encrypt a message and make it unreadable unless the recipient    knows the secret to decrypt it. Encryption has been used for    many thousands of years. The following codes and ciphers can be    learned and used to encrypt and decrypt messages by hand.  <\/p>\n<p>        You can now get these codes and ciphers on your iPhone or        iPad and send secret messages from anywhere.      <\/p>\n<p>    Monoalphabetic Ciphers<\/p>\n<p>    A monoalphabetic cipher uses the same substitution across the    entire message. For example, if you know that the letter A is    enciphered as the letter K, this will hold true for the entire    message. These types of messages can be cracked by using    frequency analysis,    educated guesses or trial and error.  <\/p>\n<p>    In a polyalphabetic cipher, the substitution may change    throughout the message. In other words, the letter A may be    encoded as the letter K for part of the message, but later on    it might be encoded as the letter W.  <\/p>\n<p>    Instead of substituting one letter for another letter, a    polygraphic cipher performs substitutions with two or more    groups of letters. This has the advantage of masking the    frequency distribution of letters, which makes frequency analysis attackes much    more difficult.  <\/p>\n<p>    Unlike substitution ciphers that replace letters with other    letters, a transposition cipher keeps the letters the same, but    rearranges their order according to a specific algorithm.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.braingle.com\/brainteasers\/codes\/index.php\" title=\"Braingle: Codes, Ciphers, Encryption and Cryptography\">Braingle: Codes, Ciphers, Encryption and Cryptography<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Codes, Ciphers, Encryption and Cryptography Cryptography is the discipline of using codes and ciphers to encrypt a message and make it unreadable unless the recipient knows the secret to decrypt it. Encryption has been used for many thousands of years<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-30637","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/30637"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=30637"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/30637\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=30637"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=30637"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=30637"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}