Statements (63)
Predicate | Object |
---|---|
gptkbp:instanceOf |
cipher
|
gptkbp:canCreate |
ciphertext
|
gptkbp:canEstablish |
text
|
gptkbp:developedBy |
gptkb:Blaise_de_Vigenère
|
gptkbp:energyEfficiency |
Caesar_cipher
|
gptkbp:firstAppearance |
1586
|
gptkbp:hasVariants |
autokey_cipher
beaufort_cipher |
https://www.w3.org/2000/01/rdf-schema#label |
Vigenère cipher
|
gptkbp:isAssociatedWith |
encryption techniques
secret messages |
gptkbp:isBasedOn |
Caesar_cipher
|
gptkbp:isConsidered |
classical cipher
obsolete for modern use |
gptkbp:isDescribedAs |
literature
|
gptkbp:isExaminedBy |
textbooks
online tutorials mathematics of cryptography |
gptkbp:isExploredIn |
academic papers
mathematical research information security computer security courses |
gptkbp:isIncorporatedIn |
workshops
educational settings coding challenges |
gptkbp:isLedBy |
modern ciphers
|
gptkbp:isLocatedIn |
software
programming languages |
gptkbp:isNamedAfter |
gptkb:Blaise_de_Vigenère
|
gptkbp:isPartOf |
mathematical puzzles
cryptographic history cryptographic education |
gptkbp:isPopularIn |
escape rooms
|
gptkbp:isRecognizedFor |
secure communications
historical encryption method important historical cipher |
gptkbp:isRelatedTo |
transposition cipher
|
gptkbp:isStudiedIn |
computer science
|
gptkbp:isSymbolicOf |
encryption method
|
gptkbp:isTaughtIn |
cryptography courses
|
gptkbp:isTrainedIn |
security assessments
cryptanalysis |
gptkbp:isUsedBy |
amateur cryptographers
|
gptkbp:isUsedFor |
frequency analysis
|
gptkbp:isUsedIn |
cryptography
historical documents historical reenactments puzzles board games online games educational games |
gptkbp:isUtilizedFor |
decode without key
|
gptkbp:isUtilizedIn |
puzzle competitions
spycraft |
gptkbp:isVulnerableTo |
brute force attacks
Friedman test Kasiski examination |
gptkbp:localHistory |
cipher
|
gptkbp:provides |
encryption
decryption |
gptkbp:requires |
key length
|
gptkbp:type |
polygraphic substitution cipher
|
gptkbp:uses |
keyword
|