{"id":1569,"date":"2025-01-16T19:15:08","date_gmt":"2025-01-16T19:15:08","guid":{"rendered":"https:\/\/sites.wcsu.edu\/roccac\/?page_id=1569"},"modified":"2025-04-30T12:49:48","modified_gmt":"2025-04-30T12:49:48","slug":"cryptology-slide-decks","status":"publish","type":"page","link":"https:\/\/sites.wcsu.edu\/roccac\/homepage\/cryptology-slide-decks\/","title":{"rendered":"Cryptology Slide Decks"},"content":{"rendered":"\n<ol class=\"wp-block-list\">\n<li><a href=\"https:\/\/sites.wcsu.edu\/roccac\/wp-content\/uploads\/sites\/33\/2025\/01\/Quick_and_Dirty_Ciphers_in_History.pdf\" data-type=\"link\" data-id=\"https:\/\/sites.wcsu.edu\/roccac\/wp-content\/uploads\/sites\/33\/2025\/01\/Quick_and_Dirty_Ciphers_in_History.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Quick and Dirty Cryptology History<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wcsu.edu\/roccac\/wp-content\/uploads\/sites\/33\/2025\/01\/Cryptology_Basic_Definitions_and_a_Simple_Example.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Basic Definitions and a Simple Example<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wcsu.edu\/roccac\/wp-content\/uploads\/sites\/33\/2025\/01\/Affine_and_Multiplicative_Ciphers.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Affine and Multiplicative Ciphers<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wcsu.edu\/roccac\/wp-content\/uploads\/sites\/33\/2025\/01\/Introduction_to_Frequency_Analysis.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Introduction to Frequency Analysis<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wcsu.edu\/roccac\/wp-content\/uploads\/sites\/33\/2025\/01\/Polyalphabetic_Ciphers.pdf\">Polyalphabetic Ciphers<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wcsu.edu\/roccac\/wp-content\/uploads\/sites\/33\/2025\/01\/Breaking_Polyalphabetic_Ciphers.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Breaking Polyalphabetic Ciphers<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wcsu.edu\/roccac\/wp-content\/uploads\/sites\/33\/2025\/01\/Transposition_Ciphers.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Transposition Ciphers<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wcsu.edu\/roccac\/wp-content\/uploads\/sites\/33\/2025\/01\/Breaking_Transposition_Ciphers.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Breaking Transposition Ciphers<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wcsu.edu\/roccac\/wp-content\/uploads\/sites\/33\/2025\/01\/Perfect_Secrecy.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Perfect Secrecy<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wcsu.edu\/roccac\/wp-content\/uploads\/sites\/33\/2025\/01\/Hill_s_Cipher.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Hill&#8217;s Cipher<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wcsu.edu\/roccac\/wp-content\/uploads\/sites\/33\/2025\/01\/Decrypting_Hill_s_Cipher.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Decrypting Hill&#8217;s Cipher<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wcsu.edu\/roccac\/wp-content\/uploads\/sites\/33\/2025\/01\/Ciphers_for_Number_Theory_Beamer_Presentation_1.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Ciphers and Number Theory<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wcsu.edu\/roccac\/wp-content\/uploads\/sites\/33\/2025\/01\/Fundamental_Theorem_of_Arithmetic.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Fundamental Theorem of Arithmetic<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wcsu.edu\/roccac\/wp-content\/uploads\/sites\/33\/2025\/01\/Exponents_and_Phi.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Exponents and the \\(\\phi\\)-Function<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wcsu.edu\/roccac\/wp-content\/uploads\/sites\/33\/2025\/04\/DHERSA_Beamer_Presentation.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Asymmetric Ciphers (Updated 4\/30\/2025)<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wcsu.edu\/roccac\/wp-content\/uploads\/sites\/33\/2025\/01\/Bits_Bytes__and_Feistel.pdf\" data-type=\"link\" data-id=\"https:\/\/sites.wcsu.edu\/roccac\/wp-content\/uploads\/sites\/33\/2025\/01\/Bits_Bytes__and_Feistel.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Bits, Bytes, and Feistel<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wcsu.edu\/roccac\/wp-content\/uploads\/sites\/33\/2025\/03\/Feistel___DES___AES.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Feistel, DES, and AES (Updated 3\/12\/2025)<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wcsu.edu\/roccac\/wp-content\/uploads\/sites\/33\/2025\/01\/Data_Encryption_Standard.pdf\" data-type=\"link\" data-id=\"https:\/\/sites.wcsu.edu\/roccac\/wp-content\/uploads\/sites\/33\/2025\/01\/Data_Encryption_Standard.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Data Encryption Standard<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wcsu.edu\/roccac\/wp-content\/uploads\/sites\/33\/2025\/01\/Elliptic_Curves.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Elliptic Curve Cryptology (Updated 1\/29\/2025)<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wcsu.edu\/roccac\/wp-content\/uploads\/sites\/33\/2025\/01\/Elliptic_Curves_FY_Edition.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Elliptic Curves FY Edition<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wcsu.edu\/roccac\/wp-content\/uploads\/sites\/33\/2025\/01\/Lattices.pdf\" data-type=\"link\" data-id=\"https:\/\/sites.wcsu.edu\/roccac\/wp-content\/uploads\/sites\/33\/2025\/01\/Lattices.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Lattice Based Encryption<\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":35,"featured_media":0,"parent":2,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"wpo365_audiences":[],"wpo365_private":false,"footnotes":""},"class_list":["post-1569","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/sites.wcsu.edu\/roccac\/wp-json\/wp\/v2\/pages\/1569","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.wcsu.edu\/roccac\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wcsu.edu\/roccac\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wcsu.edu\/roccac\/wp-json\/wp\/v2\/users\/35"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wcsu.edu\/roccac\/wp-json\/wp\/v2\/comments?post=1569"}],"version-history":[{"count":0,"href":"https:\/\/sites.wcsu.edu\/roccac\/wp-json\/wp\/v2\/pages\/1569\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wcsu.edu\/roccac\/wp-json\/wp\/v2\/pages\/2"}],"wp:attachment":[{"href":"https:\/\/sites.wcsu.edu\/roccac\/wp-json\/wp\/v2\/media?parent=1569"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}