Navigation
-
Recent Posts
Archives
- September 2018
- November 2017
- August 2017
- May 2017
- January 2017
- December 2016
- October 2016
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- March 2016
- January 2016
- December 2015
- November 2015
- September 2015
- March 2015
- December 2014
- November 2014
- March 2014
- January 2014
- March 2013
- February 2013
- October 2012
- July 2012
- February 2012
- January 2012
- December 2011
- January 2011
- July 2010
- April 2010
- December 2009
- July 2009
- December 2008
- July 2008
- June 2008
- February 2008
- September 2007
- June 2007
- March 2007
- December 2006
- July 2006
- April 2006
- February 2006
- November 2005
- October 2005
- July 2005
- June 2005
- May 2005
- April 2005
Categories
Meta
Monthly Archives: March 2015
Breaking the one-time pad encryption
Following up the second week task for the excellent Cryptography course by Prof. Jonathan Katz at Coursera, and took the second programming assignment. This time it is about breaking the one-time pad encryption when the code was reused, and more than one ciphertext is intercepted. Again, the suggested approach required too much manual work, and […]
reverse engineering Comments Off on Breaking the one-time pad encryption
Breaking the Vigenere cipher
I have signed up for the excellent Cryptography course by Prof. Jonathan Katz at Coursera, and took the first programming assignment which was about breaking the Vigenere cipher. The instructor explained one of the ways to do it, and recommended to rely on letter distribution in English. But while the suggested approach was interesting, I […]