1
10
1
-
https://d1y502jg6fpugt.cloudfront.net/50341/archive/files/84712dcc7f7179ef5dbca911a2de3d9b.png?Expires=1712793600&Signature=cUpXWF0dUbRBr-sWhodS9uGJH%7EK0NSWTFm%7E9iJdT29SuEvXU7H0Pt3KpQB1ENRMh2hZQnlcMAVjOkQeMw2V49qdSWsuSQkTphGadiIJFRUK57Vwr2pQ%7EpqU%7E6MCnLhimN-e4jqDbiOM5QahNxfAf97OcAdIMmmW3WwtDG0KEGESYjtReu7MmRpiUtnq350PtLWFBTuYqZTgtItiDu8aVqfWQvAaXUHiqV9Y5eZ5asZnLwMZ4PjVuC31U8Jm3habz%7EsNPSMNUygugtfHR4pTzdnVUH2p13fete%7EqweCInxc%7E-5GtpaJarRn35fYjrbd096FvSZ-N1UM7JgjizrEAJ%7Ew__&Key-Pair-Id=K6UGZS9ZTDSZM
9a559be465682b6b55a5787eef9103e6
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
Classical Ciphers and Application
Subject
The topic of the resource
Classical Ciphers and Application
Description
An account of the resource
Classical Ciphers and Application features analyses of various ciphers- including classical ciphers and the application of ciphers used during WWII. The purpose of the collection is to explain how classical ciphers work and show the patterns among substitution (replacement) and transposition(scramble) ciphers. For further understanding in application, it attempts to provide an analysis of the famous substitution ciphers- the Zimmerman Telegram and WWII Pigeon Cipher.
Still Image
A static visual representation. Examples include paintings, drawings, graphic designs, plans and maps. Recommended best practice is to assign the type Text to images of textual materials.
Original Format
The type of object, such as painting, sculpture, paper, photo, and additional data
Cipher
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
Caesar Cipher
Subject
The topic of the resource
Caesar Cipher
Description
An account of the resource
The Caesar Cipher is one of the oldest ciphers, used by Julius Caesar to communicate with his generals. It works by shifting the alphabet down by a fixed number, or key. Due to the simplicity, it can be broken if the crypanalyst knows that a simple substitution method has been used to get the ciphertext, or the Caesar Cipher itself.<br /><br />One method of deciphering a Caesar Cipher is by using a brute approach and noting the frequency of each letter used- then comparing those frequencies to a frequency distribution chart of the alphabet. For example, 'E' is the most freqently used letter in the alphabet. Theoretically, if 'G' is the most freqently used letter in the ciphertext, you may able to shift the alphabets so that 'E' aligns with 'G' to decipher the rest of the ciphertext.
Creator
An entity primarily responsible for making the resource
Julius Caesar
Source
A related resource from which the described resource is derived
https://www.cs.mcgill.ca/~rwest/wikispeedia/wpcd/wp/c/Caesar_cipher.htm
Publisher
An entity responsible for making the resource available
Cs.mcgill.ca
Format
The file format, physical medium, or dimensions of the resource
.JPEG
Language
A language of the resource
English
Type
The nature or genre of the resource
Cipher
Date
A point or period of time associated with an event in the lifecycle of the resource
44 B.C.
Caesar Cipher
Greek