Differences between revisions 5 and 6
Revision 5 as of 2019-08-07 19:37:02
Size: 1778
Editor: amy
Comment:
Revision 6 as of 2019-08-07 19:39:53
Size: 1737
Editor: rlmiller
Comment:
Deletions are marked like this. Additions are marked like this.
Line 5: Line 5:
This page was be created at Sage Days, 7-10 August 2019 by Sarah Arpin, Catalina Camacho-Navarro, Holly Paige Chaos, Amy Feaver, Eva Goedhart, Rebecca Lauren Miller, Alexis Newton, and Nandita Sahajpal. This page was be created at Sage Days 103 , 7-10 August 2019 by Sarah Arpin, Catalina Camacho-Navarro, Holly Paige Chaos, Amy Feaver, Eva Goedhart, Rebecca Lauren Miller, Alexis Newton, and Nandita Sahajpal.
Line 7: Line 7:
If you have cryptography related interactions that you are interested in adding to this page, please do so. You can also contact Amy Feaver at [email protected] (insert my name in 'firstname' and 'lastname') if you have interactions that you are interested in having us add to the page during Sage Days. We will consider them and add them in if we can! If you have cryptography related interactions that you are interested in adding to this page, please do so. You can also contact Amy Feaver at [email protected]  if you have interactions that you are interested in having us add to the page during Sage Days. We will consider them and add them in if we can!

Sage Interactions - Cryptography - Under Construction

This page was be created at Sage Days 103 , 7-10 August 2019 by Sarah Arpin, Catalina Camacho-Navarro, Holly Paige Chaos, Amy Feaver, Eva Goedhart, Rebecca Lauren Miller, Alexis Newton, and Nandita Sahajpal.

If you have cryptography related interactions that you are interested in adding to this page, please do so. You can also contact Amy Feaver at [email protected] if you have interactions that you are interested in having us add to the page during Sage Days. We will consider them and add them in if we can!

goto interact main page

Shift Cipher

by Sarah Arpin, Alexis Newton

A classical cryptosystem that takes your text and shifts it through the alphabet by a given number of letters. -EG

Affine Cipher

by Sarah Arpin, Alexis Newton

Substitution Cipher

by Catalina Camacho-Navarro

A simple cipher to encrypt messages in which each letter is assigned to another letter. Brute force or frequency analysis can be used to decrypt. -EG

Vigenère Cipher

by Holly Paige Chaos and Rebecca Lauren Miller

Using a secret key word, encrypt each letter by shifting it the corresponding letter in the key word. -EG

interact/cryptography (last edited 2019-11-14 19:53:51 by chapoton)