issue142:boucle_linux
Différences
Ci-dessous, les différences entre deux révisions de la page.
Prochaine révision | Révision précédente | ||
issue142:boucle_linux [2019/02/24 15:25] – créée auntiee | issue142:boucle_linux [2019/03/13 10:11] (Version actuelle) – andre_domenech | ||
---|---|---|---|
Ligne 1: | Ligne 1: | ||
- | The early days of encryption were tied to the art of war. The Roman empire used scytales and lettered leather strips during battle. Other countries utilized various tools to accomplish the same goal. Perhaps the most known use of encryption is the German Enigma Machine. This code was successfully broken by the British. Later the Japanese Purple Code was broken by the Americans. The Axis powers used the encryption devices to coordinate their military forces into early wins during World War II. Yet these machines were broken, and used by the Allies to win the war theaters in Europe and Asia. The early encryption devices were large, complicated, | + | **The early days of encryption were tied to the art of war. The Roman empire used scytales and lettered leather strips during battle. Other countries utilized various tools to accomplish the same goal. Perhaps the most known use of encryption is the German Enigma Machine. This code was successfully broken by the British. Later the Japanese Purple Code was broken by the Americans. The Axis powers used the encryption devices to coordinate their military forces into early wins during World War II. Yet these machines were broken, and used by the Allies to win the war theaters in Europe and Asia. The early encryption devices were large, complicated, |
The father of modern mathematical cryptography is Claude E. Shannon. He recognized the binary condition of communications and wrote a paper called “Communication Theory of Secrecy Systems” while working at Bell Labs. IBM then developed a block process encryption to protect its business during the 1970’s. Later on, this was adopted by the United States as the standard and called it the Data Encryption Standard (DES). DES was not broken until 1996 using supercomputers. A more advanced version of DES is now currently being used called Advanced Encryption Standards. This standard is currently being used. | The father of modern mathematical cryptography is Claude E. Shannon. He recognized the binary condition of communications and wrote a paper called “Communication Theory of Secrecy Systems” while working at Bell Labs. IBM then developed a block process encryption to protect its business during the 1970’s. Later on, this was adopted by the United States as the standard and called it the Data Encryption Standard (DES). DES was not broken until 1996 using supercomputers. A more advanced version of DES is now currently being used called Advanced Encryption Standards. This standard is currently being used. | ||
- | Consequently, | + | Consequently, |
+ | |||
+ | Les débuts du chiffrage sont liés à l'art de la guerre. L' | ||
+ | |||
+ | Le père de la cryptographie mathématique moderne est Claude E. Shannon. Il reconnaissait la condition binaire des communications et a écrit un article appelé « Communication Theory of Secrecy Systems » (La théorie de la communication des systèmes secrets) pendant qu'il travaillait chez Bell Labs. Puis IBM a développé un chiffrage par traitement de blocs pour protéger ses affaires pendant les années 1970. Plus tard, il fut adopté par les États-Unis en tant que standard, et baptisé Data Encryption Standard (DES, norme de chiffrement des données). DES n'a pas été décodé jusqu' | ||
+ | |||
+ | Le besoin de chiffrement se fait toujours sentir avec le déploiement de services dans le nuage. Les ordinateurs portables puissants d' | ||
issue142/boucle_linux.1551018318.txt.gz · Dernière modification : 2019/02/24 15:25 de auntiee