Skip to main content

Home/ Math 1111: Cryptography/ Group items tagged Communication

Rss Feed Group items tagged

saraatsai

Crypto modernization transforms military communications - 1 views

  •  
    Embeddable cryptographic processors are enabling a host of new defense communications applications, such as smartphones and tablet computers for tactical use on the front lines, but should soldiers be using the same object for both secure and insecure communications? Or does this create a conflict of interests?
  •  
    This is an article about the advancement of technology and how it has affected cryptography and secret-keeping during wartime.
Tyren Herbst-Ingram

Understanding Cryptography in Modern Military Communications - 0 views

  •  
    A look at some older cryptography used by the military and a look at what they are transitioning to
ftiet21

China to launch hack-proof quantum communication network in 2016 - 2 views

  •  
    China will complete and put into service the world's longest quantum communication network stretching 2,000km from Beijing to Shanghai by 2016. By 2030, the Chinese network would be extended worldwide, Xinhua reported.
Kristin Davis

UK recruits code-breakers with online puzzle - CNN - 0 views

  •  
    The Government Communications Headquarters in the UK offered a job application to anyone who could solve their code found at www.canyoucrackit.co.uk
Ryan McLaughlin

Britain's GCHQ Uses Online Puzzle to Recruit Hackers - NYTimes.com - 0 views

  •  
    Instead of hiring "upper-class twits from Oxford and Cambridge," A government communications agency tried a new angle on recruiting hackers. They decided to combat hackers with other experienced hackers by posting an online puzzle and offering a job interview to those who solved it.
Derek Bruff

GCHQ taps fibre-optic cables for secret access to world's communications | UK news | gu... - 0 views

  •  
    Hey, look, the British are reading our emails, too...
Derek Bruff

Security In A Box | Tools and tactics for your digital security - 2 views

shared by Derek Bruff on 12 Nov 14 - No Cached
  •  
    Security in-a-box is a collection of guides and free tools to secure your computer, protect your information or maintain the privacy of your Internet communication. It was created to meet the digital security and privacy needs of advocates and human rights defenders.
Abbey Roberts

Edward Snowden | US news | The Guardian - 0 views

  •  
    "Latest on the computer analyst whistleblower who provided the Guardian with top-secret NSA documents leading to revelations about US surveillance on phone and internet communications" - compilation of news sources on Edward Snowden
mattgu123

Saving the bacon during the first world war - 0 views

  •  
    I thought this was a well written article because the author is informative without being too dry in her descriptions. Blogs do tend to be more conversational and this one is no exception. The academic focus on this relatively historic topic is still present, but the article is written for a wider audience than the academic community.
kims46

Kerckhoffs' history and principles of military cryptography, translated and adnotated. ... - 1 views

  •  
    This is a cryptography blogger's translation of Kerckhoff's article about military cryptography. He denotes that secret methods of communication are limited to higher officers due to potential leakage; but by limiting cryptographic use, are they potentially putting at risk the safety of lesser positions in order to keep the secrecy of their cipher methods? Is this just the inevitable nature of cryptography in general?
yuthraju

International Association for Cryptologic Research - 2 views

  •  
    The International Association for Cryptologic Research (IACR) is a non-profit scientific organization whose purpose is to further research in cryptology and related fields. Cryptology is the science and practice of designing computation and communication systems which are secure in the presence of adversaries.
Derek Bruff

Blogging Like a Connected Courses Champion | Connected Courses - 0 views

  •  
    Some great advice on blogging as part of a learning community, like we're doing in this course.
chrisr22

How the Deep Web Works - HowStuffWorks - 0 views

  •  
    What a tangled web we weave, indeed. About 40 percent of the world's population uses the Web for news, entertainment, communication and myriad other purposes [source: Internet World Stats]. Yet even as more and more people log on, they are actually finding less of the data that's stored online.
kims46

Everyday Uses of Encryption -CodeIdol - 1 views

  •  
    This source gives a variety of examples in which encryption is used for security everyday, like ATM machines and DVD players. It seems like this is a pretty useful list because it goes into sufficient enough depth to describing the different examples, and specifically explains how encryption comes into play - without making it too long or hard to understand.
rmusicant

NSA debate takes new turns after Paris attacks - 4 views

  •  
    Privacy advocates are pushing back against arguments from the intelligence community that more surveillance powers would have prevented the deadly Paris terrorist attacks. They're offended at what they see as naked opportunism from supporters of tough surveillance powers and argue the rhetoric - including suggestions that National Security Agency leaker Edward Snowden has blood on his hands - has gone too far.
Derek Bruff

5 Gmail lessons from Petraeus affair - POLITICO - 1 views

  •  
    I got the General Petraeus story a bit wrong. He and his friend weren't using Google docs to communicate, they used a shared Gmail account. They would sometimes draft, but not send emails, as an extra measure of security, but, as this article points out, that doesn't work.
ftiet21

After Paris, What We're Getting Wrong In 'Privacy vs. Security' Debate - 5 views

  •  
    This article discusses the faults in former deputy director of the CIA Michael Morell's statement that the use of encrypted apps made it difficult to stop terrorists. Claims that encrypted communications put them out of reach was false - there had been no change in al Qaeda tactics. Also, author Howard points out that there isn't a clear dichotomy between privacy and security.
krschroeder9

The Importance of Understanding Encryption in Cybersecurity - 0 views

  •  
    Any sensitive information that could be accessed by hackers should be encrypted, especially when communicating over wireless networks. Make sure to keep your private key confidential.
1 - 20 of 25 Next ›
Showing 20 items per page