Skip to main content

Home/ Math 1111: Cryptography/ Group items tagged Encryption

Rss Feed Group items tagged

jacobsb

FERPA Compliance: Protecting Student Data through Encryption - Virtru - 0 views

  •  
    Schools have a responsibility to protect your information, but it can be vulnerable to release or data breaches. Be careful when giving out personal information and try to educate yourself on your rights as a student so that you can best protect yourself.
Malak Elmousallamy

Pigeon Code Baffles British Cryptographers - 0 views

  •  
    Britain's code-breakers acknowledged Friday that an encrypted handwritten message from World War II, found on the leg of a long-dead carrier pigeon in a household chimney in southern England, has thwarted all their efforts to decode it since it was sent to them last month.
Hannah Lee

BBC News - Privacy project uses cryptography to reduce shared info - 0 views

  •  
    This article describes efforts to create an "electronic wallet" to make sharing confidential information more secure and efficient.
Tyren Herbst-Ingram

S. Carolina governor admits errors in hacking of tax records - 0 views

  •  
    South Carolina gets hacked due to "outdated" technology
Tyren Herbst-Ingram

Mafia boss undone by clumsy Caesar cipher - 0 views

  •  
    Clues left in the clumsily encrypted notes of a Mafia don have helped Italian investigators to track his associates and ultimately contributed to his capture after years on the run. The recently busted Bernardo Provenzano, reputed to be the "boss of bosses" of the Sicilian Mafia, used a modified form of the Caesar cipher to obscure "sensitive information" in notes left to either his family or underlings.
sareennl

Tools boast easy cracking of Microsoft crypto for businesses - 0 views

  •  
    Summary: Cryptography specialists have developed tools to crack PPTP encryption (based on an algorithm from Microsoft), gaining access to Wi-Fi, passwords, corporate networks and data.
Collin Jackson

The Fastest-Ever Random Number Generator Conjures Digits from Subatomic Noise in a Vacuum - 0 views

  •  
    Not directly involving cryptography, but the implications of this definitely affect the field. Now that we have the capability to generate truly random number strings, our ability to encrypt data will improve.
whitnese

Cracking The Vigenere Cipher - 3 views

  •  
    This post is about cracking the vigenere cipher. It also uses computer programming to solve it which I found interesting.
hamzapatel123

Could There Have Been a Revision of Beale's Letters? - 1 views

  •  
    I found this interesting because it mentions the fact that there may have been a revision to the Beale cipher before it was published.
masonagrow

NSA Methodology for Adversary Obstruction - 0 views

  •  
    I really just wonder what kind of decision-making went into creating this document--what they decided to add and take out, etc. This source also has outside sources on the final pages.
Derek Bruff

5 Fun Facts From the Latest NSA Leak | Threat Level | Wired.com - 0 views

  •  
    Apparently, if you use strong encryption, the NSA pays more attention to you.
ftiet21

China to launch hack-proof quantum communication network in 2016 - 2 views

  •  
    China will complete and put into service the world's longest quantum communication network stretching 2,000km from Beijing to Shanghai by 2016. By 2030, the Chinese network would be extended worldwide, Xinhua reported.
Derek Bruff

Another Salvo in the Second Crypto War (of Words) - Schneier on Security - 0 views

  •  
    And here's Bruce Schneier on that story about Apple's encryption policies thwarting justice. If you read the first piece, you should also read this one.
Derek Bruff

NSA Plans for a Post-Quantum World - Schneier on Security - 0 views

  •  
    Here's a recent piece by security expert Bruce Schneier on quantum computing, which is different than quantum cryptography. (I conflated the two during class today.) Quantum computing is very fast computing that could be used to quickly break modern encryption schemes. Quantum cryptography involves sending messages that can't be read, since "looking" at them changes the message. Schneier offers some conjectures about where the NSA is with regard to both technologies.
« First ‹ Previous 81 - 100 of 156 Next › Last »
Showing 20 items per page