E-text for a book detailing the fundamentals behind modern cryptography and how they are applied in practice. Lots of detailed information about various underlying theorems and mathematical properties and how they work, as well as various encryption techniques and cryptographic processes.
This blog is all about privacy, as the title suggests. The majority of the blog posts use actual examples, such as the Ashley Madison hack, in order to reveal important cybersecurity lessons. One particular blog post explains how Passages, a secure virtual browser, is a lot like hand sanitizer for the web. I thought that this blog was particularly interesting because it had a lot of relevant, unique examples about privacy and cryptography in the modern world.
Embeddable cryptographic processors are enabling a host of new defense communications applications, such as smartphones and tablet computers for tactical use on the front lines, but should soldiers be using the same object for both secure and insecure communications? Or does this create a conflict of interests?
Online collaboration over the claimed proof "P versus NP" demonstrates the potential of the internet in the field of mathematical and intellectual research alike. The proof "P versus NP," if verified, would make obsolete modern cryptography, which works under the assumption that P does not equal NP.
A useful document detailing the different substitution ciphers (including the Caesar Shift) and the application of Modular Arithmetic in modern day Cryptography.
Here's a recent piece by security expert Bruce Schneier on quantum computing, which is different than quantum cryptography. (I conflated the two during class today.) Quantum computing is very fast computing that could be used to quickly break modern encryption schemes. Quantum cryptography involves sending messages that can't be read, since "looking" at them changes the message. Schneier offers some conjectures about where the NSA is with regard to both technologies.
This article discusses how there needs to be advanced cryptography in many facets of life for a person in the modern era from credit cards to phone calls to ATMS. It also describes how encryption uses such a large number of combinations, a brute force attack will never worm