Skip to main content

Home/ Math 1111: Cryptography/ Group items tagged Cryptography

Rss Feed Group items tagged

1More

Kerckhoffs' history and principles of military cryptography, translated and adnotated. ... - 1 views

  •  
    This is a cryptography blogger's translation of Kerckhoff's article about military cryptography. He denotes that secret methods of communication are limited to higher officers due to potential leakage; but by limiting cryptographic use, are they potentially putting at risk the safety of lesser positions in order to keep the secrecy of their cipher methods? Is this just the inevitable nature of cryptography in general?
1More

Journey Into Cryptography - 1 views

  •  
    How have humans protected their secret messages through history? What has changed today?
1More

Visual Cryptography - 0 views

  •  
    What is Visual Cryptography Visual Cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human vision if the correct key image is used. The technique was proposed by Naor and Shamir in 1994. Visual Cryptography uses two transparent images.
1More

Why encryption would not have saved General Petraeus - 1 views

  •  
    A summary of why encryption wouldn't have prevented General Petraeus from getting caught. Like the quote: "If you think cryptography is the solution to your problem, you either don't understand cryptography or you don't understand your problem."
1More

Cryptography in Everyday Life - 3 views

  •  
    This page is from the University of Texas, and it describes different aspects of cryptography in everyday life. For instance, it explains how cryptography plays a large role in authentication, digital money, and time stamping. I liked this webpage because it had a lot of different examples with clear explanations.
1More

Quantum cryptography keys ride the lightning on existing fiber lines - 1 views

  •  
    Quantum computing has teased us with its potential for some time, but we won't be seeing qubits in our laptops anytime soon. However, science has also sought to leverage quantum physics in cryptography, and a recent breakthrough will allow for quantum encryption over fiber optic cables already in use.
1More

Understanding Cryptography in Modern Military Communications - 0 views

  •  
    A look at some older cryptography used by the military and a look at what they are transitioning to
1More

Military encryption's going open -- Defense Systems - 2 views

  •  
    This makes me wonder how ethical it is for the NSA to be so heavily involved in cryptography internationally. Are they building a backdoor into these crytographic systems? If so, how ethical could that be?
1More

Military Embedded Systems - 0 views

  •  
    This resource provides access to articles, news, and blog posts regarding military embedded systems, often using cryptography. One article referenced the cryptography used to secure "Data at Rest" and the length at which this information should be held secure. Is it ethical to keep this information from the public when safety is no longer a concern? At what point should these well-kept secrets become accessible?
2More

Extreme cryptography paves way to personalized medicine - 0 views

  •  
    Encrypted analysis of data in the cloud would allow secure access to sensitive information.
  •  
    Homomorphic encryption is pretty amazing. What they're proposing in this article is a bit like having a computer analyze an encrypted novel and determining which sentences were grammatically incorrect--without even knowing what the plaintext sentences were!
2More

A Brief History of Cryptography | Red Hat Security - 0 views

  •  
    Cryptology is a young science. Though it has been used for thousands of years to hide secret messages, systematic study of cryptology as a science (and perhaps an art) just started around one hundr...
  •  
    Cryptology is a young science. Though it has been used for thousands of years to hide secret messages, systematic study of cryptology as a science (and perhaps an art) just started around one hundr...
1More

Bristol Cryptography Blog - 1 views

  •  
    Blog for the University of Bristol cryptography research group; research and posts geared towards cryptology students
1More

Cryptography - Wikipedia, the free encyclopedia - 1 views

  •  
    Good for resources; especially see references and further reading sections!
1More

Journal of Theoretical Physics and Cryptography - 0 views

  •  
    The Journal of Theoretical Physics and Cryptography is devoted to the rapid publication of fundamental research papers on all fields of theoretical physics and cryptography. All contributions shall be rigorously refereed and selecting on the basis of quality and originality of the work as well as the breadth of interest to readers.
1More

Modern Cryptography: Theory and Practice - 0 views

  •  
    E-text for a book detailing the fundamentals behind modern cryptography and how they are applied in practice. Lots of detailed information about various underlying theorems and mathematical properties and how they work, as well as various encryption techniques and cryptographic processes.
1More

Mental cryptography and good passwords - 4 views

  •  
    This article gives a method for generating secure yet easy to remember passwords for online accounts, using encryption and modular arithmetic (!). It is an interesting use of encryption in everyday life for something we all have, password-protected internet accounts. If you click through to the computer science category, you can find other posts on cryptography, encryption, and privacy.
1More

The Privacy Blog: Privacy, Security, Cryptography, and Anonymity - 4 views

  •  
    This blog is all about privacy, as the title suggests. The majority of the blog posts use actual examples, such as the Ashley Madison hack, in order to reveal important cybersecurity lessons. One particular blog post explains how Passages, a secure virtual browser, is a lot like hand sanitizer for the web. I thought that this blog was particularly interesting because it had a lot of relevant, unique examples about privacy and cryptography in the modern world.
1 - 20 of 126 Next › Last »
Showing 20 items per page