Difference between revisions of "Historische Cipher (Caesar Cipher bis Rot13)"

From Embedded Lab Vienna for IoT & Security
Jump to navigation Jump to search
(creation)
 
Line 1: Line 1:
== Summary ==  
== Einfuhrung ==  


Description what this documentation is about.
Description what this documentation is about.


== Requirements ==
== historische Chipher und deren Funktionsweise ==


* Operating system: Ubuntu 18.04 bionic amd64
* Operating system: Ubuntu 18.04 bionic amd64
Line 10: Line 10:
In order to complete these steps, you must have followed [[Some Other Documentation]] before.
In order to complete these steps, you must have followed [[Some Other Documentation]] before.


== Description ==
== Geschichte ==


=== Step 1 ===
=== Step 1 ===
Line 27: Line 27:
* The Baroque Cycle
* The Baroque Cycle


== Used Hardware ==
== Erweiterungen des Caesar Cipher ==


[[Device to be used with this documentation]]
[[Device to be used with this documentation]]
[[Maybe another device to be used with this documentation]]
[[Maybe another device to be used with this documentation]]


== Courses ==
== aktuelle Anwendungsf¨alle in Kryptosystemen ==


* [[A course where this documentation was used]] (2017, 2018)
* [[A course where this documentation was used]] (2017, 2018)
* [[Another one]] (2018)
* [[Another one]] (2018)


== References ==
== Kryptoanalysen/Angriffe ==


* https://wikipedia.org
* https://wikipedia.org

Revision as of 15:24, 2 January 2023

Einfuhrung

Description what this documentation is about.

historische Chipher und deren Funktionsweise

  • Operating system: Ubuntu 18.04 bionic amd64
  • Packages: git emacs

In order to complete these steps, you must have followed Some Other Documentation before.

Geschichte

Step 1

Enter these commands in the shell

echo foo
echo bar

Step 2

Make sure to read

  • War and Peace
  • Lord of the Rings
  • The Baroque Cycle

Erweiterungen des Caesar Cipher

Device to be used with this documentation Maybe another device to be used with this documentation

aktuelle Anwendungsf¨alle in Kryptosystemen

Kryptoanalysen/Angriffe