Statements (100)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:blockade
|
gptkbp:automated |
computers
|
gptkbp:decrypts |
ciphertext
|
gptkbp:developed_by |
gptkb:Blaise_de_Vigenère
|
gptkbp:encrypts |
gptkb:text
|
gptkbp:first_appearance |
1586
16th century |
gptkbp:has_applications_in |
data security
|
gptkbp:has_variants |
gptkb:Vigenère_square
autokey cipher Beaufort cipher Vigenère autokey cipher |
gptkbp:historical_event |
encryption technique
|
https://www.w3.org/2000/01/rdf-schema#label |
Vigenère cipher
|
gptkbp:is_analyzed_in |
cryptanalysis studies
|
gptkbp:is_associated_with |
secret messages
|
gptkbp:is_based_on |
repeating key
|
gptkbp:is_considered |
historically significant
a teaching example an educational tool a historical curiosity a classic cipher a simple cipher |
gptkbp:is_considered_as |
historical encryption method
|
gptkbp:is_described_as |
gptkb:educational_content
gptkb:lectures workshops conferences courses academic papers online tutorials seminars cryptography textbooks |
gptkbp:is_discussed_in |
online forums
|
gptkbp:is_explored_in |
mathematical literature
mathematical puzzles computer science research cryptographic history information security courses |
gptkbp:is_implemented_in |
gptkb:software
manual methods various programming languages |
gptkbp:is_not_secure_against |
modern cryptanalysis
|
gptkbp:is_noted_for |
its complexity
|
gptkbp:is_part_of |
encryption techniques
puzzle design classical cryptography cryptographic education encryption history cipher history |
gptkbp:is_popular_in |
gptkb:literature
games movies |
gptkbp:is_related_to |
gptkb:crypt
encryption substitution cipher decryption Caesar cipher transposition cipher transposition ciphers |
gptkbp:is_studied_in |
gptkb:computer_science
gptkb:Mathematics information security mathematics of cryptography |
gptkbp:is_taught_in |
cryptography courses
|
gptkbp:is_used_by |
amateurs
|
gptkbp:is_used_for |
confidentiality
data protection secure communication |
gptkbp:is_used_in |
gptkb:crypt
gptkb:historical_documents gptkb:puzzles gptkb:historical_fiction secure communications historical reenactments classical cryptography escape rooms escape room design |
gptkbp:is_utilized_in |
gptkb:video_games
historical research interactive learning educational demonstrations |
gptkbp:is_vulnerable_to |
frequency analysis
Friedman test Kasiski examination |
gptkbp:named_after |
gptkb:Blaise_de_Vigenère
|
gptkbp:replaced_by |
frequency analysis
Kasiski examination |
gptkbp:requires |
gptkb:Microsoft_Word
key length |
gptkbp:security |
modern algorithms
|
gptkbp:suitable_for |
sensitive information
modern encryption standards |
gptkbp:type |
polygraphic substitution cipher
|
gptkbp:uses |
gptkb:Microsoft_Word
polyalphabetic substitution |
gptkbp:was_a_demonstration_of |
gptkb:educational_materials
|
gptkbp:bfsParent |
gptkb:The_Code_Book:_The_Science_of_Secrecy_from_Ancient_Egypt_to_Quantum_Cryptography
gptkb:Classical_Cryptography |
gptkbp:bfsLayer |
5
|