Coding and Cryptography
Coding and Cryptography
“I stand alone before fifty in Rome. None came before five, the
three invented, and you will be the last.”
Answer to the
Riddle
IL0V YOU
I stand alone
Before fifty in Rome
None came before five,
The tree inverted,
And you will be the last.
Coding and Cryptography
• When Julius Caesar sends his messages to his generals or trusted alliance, he
would make sure that his messages are secured and encrypted.
• This is to make sure that information will not be leaked and only those who
know the algorithm he used can understand the messages.
• Moving forward today, security of information is not only applied to war but in
all possible aspects where vital details need to be concealed.
• However, codes and cryptography does not only apply to the above
mentioned.
• This as well applies to technology, data analytics, and many more. In this
lesson, the purpose and importance of coding and cryptography will be
discussed where we will uncover the its basic applications and how it is used.
Objectives
Identification • Examples:
1. Numeric identification
Numbers number – TIN 3 or Tax
Identification #, school ID #,
bank account #
2. Alpha numeric identification
number – vehicle plate,
passwords.
Coding and Cryptography
A check digit or a check sum is used to verify errors on
identification numbers. These are single numbers generated using
the other characters from the identification number.