Step 1: Post Elusive Proof. Step 2: Watch Fireworks. - 0 views
-
Online collaboration over the claimed proof "P versus NP" demonstrates the potential of the internet in the field of mathematical and intellectual research alike. The proof "P versus NP," if verified, would make obsolete modern cryptography, which works under the assumption that P does not equal NP.
Early U.S. military cryptography - 0 views
Steganography and Cryptography Using DNA - 0 views
Cryptography and Modular Arithmetic - 0 views
Securing Medical Research: A Cybersecurity Point of View (Bruce Schneier) - 0 views
-
"The problem of securing biological research data is a difficult and complicated one. Our ability to secure data on computers is not robust enough to ensure the security of existing data sets. Lessons from cryptography illustrate that neither secrecy measures, such as deleting technical details, nor national solutions, such as export controls, will work. "
CrypTool-Online / Ciphers / Gronsfeld - 3 views
-
This outlines the gronsfeld cipher, which is a modification of the vigenere cipher. I like and find this cipher interesting because of it using numbers instead of letters, and I like cryptography which uses numbers.
-
Interesting. Gronsfeld ciphers then form a subset of Vigenere ciphers. That is, there's a one-to-one correspondence between Gronsfeld ciphers and Vigenere ciphers where keywords are formed from the letters A through J.
Zimmermann Telegram - illegal UK interception of US cable in 1917 to aid war effort - 1 views
-
This blog has information about military cryptography and privacy in general, including this post about the Zimmermann Telegram. Is it ethical to lie to an ally if it is in their best interest? What are the ethics behind spying on one's allies? Do ethics hinder one's ability to win a war, and if so, should ethics be disregarded in times of war? Another interesting post examines how Snowden should be viewed as a patriot, not a traitor. This made me question where one's loyalty should remain- to the government or to the people?
NSA Plans for a Post-Quantum World - Schneier on Security - 0 views
-
Here's a recent piece by security expert Bruce Schneier on quantum computing, which is different than quantum cryptography. (I conflated the two during class today.) Quantum computing is very fast computing that could be used to quickly break modern encryption schemes. Quantum cryptography involves sending messages that can't be read, since "looking" at them changes the message. Schneier offers some conjectures about where the NSA is with regard to both technologies.
Cryptography | MIT News - 2 views
Matt Blaze / crypto.com - 1 views
ellipticnews - 1 views
Cryptography | Red Hat Security - 0 views
Crypto modernization transforms military communications - 1 views
-
Embeddable cryptographic processors are enabling a host of new defense communications applications, such as smartphones and tablet computers for tactical use on the front lines, but should soldiers be using the same object for both secure and insecure communications? Or does this create a conflict of interests?
-
This is an article about the advancement of technology and how it has affected cryptography and secret-keeping during wartime.
‹ Previous
21 - 40 of 126
Next ›
Last »
Showing 20▼ items per page