Classical ciphers

Wadsworth's cipher

Wadsworth's cipher, or Wheatstone's cipher, was a cipher invented by Decius Wadsworth, a Colonel in the United States Army Ordnance Corps. In 1817, he developed a progressive cipher system based on a 1790 design by Thomas Jefferson, establishing a method that was continuously improved upon and used until the end of World War II. Wadsworth's system involved a set of two disks, one inside the other, where the outer disk had the 26 letters of the alphabet and the numbers 2-8, and the inner disk had only the 26 letters. The disks were geared together at a ratio of 26:33. To encipher a message, the inner disk was turned until the desired letter was at the top position, with the number of turns required for the result transmitted as ciphertext. Due to the gearing, a ciphertext substitution for a character did not repeat until all 33 characters for the plaintext letter had been used. A similar device was invented by Charles Wheatstone several years after Wadsworth. (Wikipedia).

Video thumbnail

Symmetric Key Cryptography: The Keyword Cipher

This is the second in a series about cryptography; an extremely important aspect of computer science and cyber security. It covers a substitution cipher called the keyword cipher, also known as the Vigenère cipher. It explains how a keyword, or key phrase, can be used to effectively gene

From playlist Cryptography

Video thumbnail

Math for Liberal Studies - Lecture 3.6.2 The Bifid Cipher

This is the second video lecture for Math for Liberal Studies Section 3.6: An Introduction to Cryptography. In this lecture, we discuss a new method for encrypting and decrypting messages: the bifid cipher. This method relies on converting the letters in the message to coordinates in a let

From playlist Math for Liberal Studies Lectures

Video thumbnail

Vigenere Cipher - Encryption

This video is about the Vigenere Cipher: years used, key format, encryption. Note: sorry, I may have mispronounced names. Decryption (known key): http://youtu.be/oHcJ4QLiiP8 Decryption (unknown key): http://youtu.be/LaWp_Kq0cKs

From playlist Cryptography and Coding Theory

Video thumbnail

Cryptography (part 2 of 3)

An informal introduction to cryptography. Part of a larger series teaching programming at http://codeschool.org

From playlist Cryptography

Video thumbnail

Cryptograph: Substitution Cipher (Caesar Cipher)

This lesson explains how to encrypt and decrypt a message using a Caeser cipher. Site: http://mathispower4u.com

From playlist Cryptography

Video thumbnail

Classical Cryptosystems

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

ADFGVX Cipher: Encryption and Decryption (Updated)

Encryption and Decryption of the World War One ADFGVX Cipher, through examples. This video replaces an earlier one with the same content, but has some improvements and corrections. #cryptography

From playlist Classical Cryptography

Video thumbnail

One Time Pad - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

When Chocolate was a Drug - IT'S HISTORY

» Mentioned Videos: Article "When Chocolate was Medicine" by Colmenero, Wadsworth, and Dufour By Christine Jones https://publicdomainreview.org/essay/when-chocolate-was-medicine-colmenero-wadsworth-and-dufour Attribution: Assasins by Audionautix is licensed under a Creative Commons A

From playlist IT'S HISTORY Feature Videos

Video thumbnail

Wittig & HWE Reactions - Alkene Synthesis (IOC 39)

I apologize that I pronounced 'Wittig' incorrectly in the introduction. In this episode, I discuss the Wittig & Horner-Wadsworth-Emmons reactions. These reactions are useful for the synthesis of alkenes. -----------------------------------------------------------------------------------

From playlist Organic Chemistry Lectures

Video thumbnail

Follow-up: Barbie electronic typewriter

Here is a copy of the description from the Barbie video: ---- I first found this story on the crypto museum website, which has great information about the Barbie typewriter (and other cipher machines) https://www.cryptomuseum.com/crypto/mehano/barbie/ ------- Thanks to Sarah Everett fr

From playlist My Maths Videos

Video thumbnail

Symmetric Key Ciphers

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

Live CEOing Ep 544: Language Design in Wolfram Language [Ciphers & WFR Submissions] [Part 01]

In this episode of Live CEOing, Stephen Wolfram discusses upcoming improvements and features to the Wolfram Language. If you'd like to contribute to the discussion in future episodes, you can participate through this YouTube channel or through the official Twitch channel of Stephen Wolfram

From playlist Behind the Scenes in Real-Life Software Design

Video thumbnail

Shannons Theory (Contd...2)

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

What is Bill Cipher? (Scientific Analysis)

What is Bill Cipher? Today we discover the very very confusing science of what Gravity Fall's Bill Cipher is. =======WARNING VERY VERY CONFUSING======= This video talks about dimensions and alternate universes. Your mind might explode! Sources: -http://en.wikipedia.org/wiki/Four-dim...

From playlist Scientific Videos

Video thumbnail

Stream Ciphers

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

MATH3411 Problem 99

MATH3411 Information, Codes and Ciphers This problem presents digital signatures via the DSS scheme. We are asked to find a public key from a private key, to generate a digital signature, and to check the validity of a received signature. Presented by Thomas Britz, School of Mathematics

From playlist MATH3411 Information, Codes and Ciphers

Video thumbnail

The Barbie electronic typewriter - with Just My Typewriter

I first found this story on the crypto museum website, which has great information about the Barbie typewriter (and other cipher machines) https://www.cryptomuseum.com/crypto/mehano/barbie/ ------- Thanks to Sarah Everett from Just My Typewriter, check out her channel here: https://www.y

From playlist My Maths Videos

Related pages

Ciphertext