Skip to main content

Week 5: Cryptography

Completion requirements
View all sections of the document

This diagram shows the information from Table 1 in visual form. It shows an upside down T-shaped funnel, where the ciphertext is inputted at one end of the T. The key and cipher are combined and fed into the funnel from above, meeting the ciphertext in the middle of the T. The encrypted text is then seen coming out of the other end.

 1.1 Plaintext and ciphertext