ITI 1121 Study Guide - Midterm Guide: Class Diagram, Instance Variable

53 views17 pages

Document Summary

Instructors: sherif g. aly, nathalie japkowicz, and marcel turcotte. No part of this document may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise without prior written permission from the instructors. Cryptography has been used for thousands of years to protect secrets. Information that needs protec- tion could be put in a form that is more di cult to comprehend through a process called encryption . The process can be reversed through a process called decryption . There are many very e ective ways by which this can be achieved to protect the most sensitive secrets, however, two extremely simple ways that have been used since older ages involve: Substitution : where a text is replaced by another corresponding cipher text. For example, if the alphabet of your text is: The sentence commander will be encrypted as bljjzkrao .