Statements (56)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:crypt
|
gptkbp:developed_by |
ancient times
|
https://www.w3.org/2000/01/rdf-schema#label |
Classical Cryptography
|
gptkbp:includes |
gptkb:crypt
gptkb:Rail_Fence_cipher gptkb:Vigenère_cipher gptkb:Playfair_cipher Caesar cipher |
gptkbp:is_applied_in |
data protection
secure communications information security |
gptkbp:is_associated_with |
gptkb:crypt
encryption key management decryption secret codes |
gptkbp:is_based_on |
mathematical principles
|
gptkbp:is_challenged_by |
gptkb:quantum_cryptography
social engineering insider threats advancements in computing new attack vectors |
gptkbp:is_documented_in |
gptkb:books
gptkb:academic_journals research papers |
gptkbp:is_explored_in |
gptkb:historical_texts
|
gptkbp:is_influenced_by |
gptkb:computer_science
gptkb:Mathematics linguistics |
gptkbp:is_practiced_in |
gptkb:Espionage
gptkb:military_personnel cryptographers |
gptkbp:is_recognized_as |
an art and science
a historical study a critical skill for security professionals a foundational aspect of security |
gptkbp:is_related_to |
modern cryptography
|
gptkbp:is_studied_in |
cryptography courses
|
gptkbp:is_taught_in |
universities
military academies |
gptkbp:is_used_in |
military communications
diplomatic communications |
gptkbp:is_vulnerable_to |
frequency analysis
brute force attack chosen-plaintext attack ciphertext-only attack known-plaintext attack |
gptkbp:originated_in |
with technology
with algorithms with computing power with network security with quantum computing |
gptkbp:uses |
substitution ciphers
transposition ciphers |
gptkbp:bfsParent |
gptkb:Quantum_Cryptography
|
gptkbp:bfsLayer |
4
|