1. The document discusses various identification codes and cryptography. Identification codes discussed include the Universal Product Code (UPC), International Standard Book Number (ISBN), and United States Postal Services codes. These codes use a combination of numbers and a check digit to verify accuracy.
2. Cryptography is defined as the process of encrypting and decrypting messages. It originated from Greek words meaning "hidden writing". Encryption encodes a message, while decryption decodes it back to the original text. Keys and algorithms are used to encrypt and decrypt messages securely. Common cryptographic methods mentioned are the shift cipher and modulo operator.
1. The document discusses various identification codes and cryptography. Identification codes discussed include the Universal Product Code (UPC), International Standard Book Number (ISBN), and United States Postal Services codes. These codes use a combination of numbers and a check digit to verify accuracy.
2. Cryptography is defined as the process of encrypting and decrypting messages. It originated from Greek words meaning "hidden writing". Encryption encodes a message, while decryption decodes it back to the original text. Keys and algorithms are used to encrypt and decrypt messages securely. Common cryptographic methods mentioned are the shift cipher and modulo operator.
- is mainly used in products sold in department stores and groceries. It consists of barcodes with 12 digits where the last one is the check digit.
Cryptography
- originated from two greek words, “krypto”
which means hidden and “graphene” which means writing. It is the making or breaking of secret codes. It uses two processes namely: encryption and decryption 2. International Standard Book Number 1. Encryption (ISBN) - the process of transforming plain - is used on books which is usually found at text into code form using a certain the last page of the book. ISBN can be ISBN- algorithm. 10 or ISBN-13 where they used 10 or 13 digits string of number respectively with the last digit as the check digit. 3. United States Postal Services (USPS) - is an independent agency of the executive 2. Decryption branch of the United States federal - the process of converting back the government responsible for providing coded message into plain text. postal services in US. It is consist of 11 digits. Key 4. Credit Cards - Refers to the strings of information that is - is composed of 16 digits where the last digit used to reveal the encrypted message into is also the check digit. readable form - All two digit number treat as 1 number then continue adding Methods of Cryptography
1. Shift Cipher (Caesar Cipher)
2. Using a Modulo Operator
Shift Cipher
- the simple type of substitution cipher. It uses
shift in forming the key of cryptography.
Modulo Operator
- the sender of the message uses the key
K to encrypt and to decrypt the secret message. 1 CHECK CODES & DIGITS & CRYPTOGRAPHY - The key K may have any integer value from 0 to 25 and this will be shared to the person/s who will be receiving the secret message.