Skip to main content

Home/ Math 1111: Cryptography/ Group items tagged InTheNews

Rss Feed Group items tagged

1More

Step 1: Post Elusive Proof. Step 2: Watch Fireworks. - 0 views

  •  
    Online collaboration over the claimed proof "P versus NP" demonstrates the potential of the internet in the field of mathematical and intellectual research alike. The proof "P versus NP," if verified, would make obsolete modern cryptography, which works under the assumption that P does not equal NP.
1More

Eastern European Cybercriminals Said to Trump Asian Counterparts in Sophistication CIO.com - 0 views

  •  
    Eastern European hackers have been proven more effective at their craft than Asian cybercriminals due to their precision, focus, and ability to protect their identities. 
1More

Cisco Releases Cloud IPS, Upgrades Security Products - 0 views

  •  
    An article about a Cisco security upgrade for the cloud and various devices that access the cloud.
1More

Hacked Chamber of Commerce Opposed Cybersecurity Law - 0 views

  •  
    This is another example of the debate on whether security or privacy is more important.
1More

Quantum processor's prime feat raises security issues | ZDNet - 0 views

  •  
    Summary: California researchers report a breakthrough with the creation of a solid-state quantum processor that could ultimately have a bearing on future cryptographic techniques. Researchers in California have designed and built a quantum processor capable of factoring 15 into its primes - with major implications for computer security.
1More

New security flaws detected in mobile devices - USATODAY.com - 0 views

  •  
    Mobile devices offer incredibly low security or protection from criminals trying to decipher data. 
1More

UK recruits code-breakers with online puzzle - CNN - 0 views

  •  
    The Government Communications Headquarters in the UK offered a job application to anyone who could solve their code found at www.canyoucrackit.co.uk
1More

How 18th-Century Copiale Cipher Was Cracked - 0 views

  •  
    A description of how the Copiale Cipher was cracked. 
1More

WWII pigeon message stumps GCHQ - 0 views

  •  
    Continuation of a story I posted a while ago. Britain's top code-breakers say they are stumped by a secret code found on the leg of a dead pigeon. .
1More

Pigeon Code Baffles British Cryptographers - 0 views

  •  
    Britain's code-breakers acknowledged Friday that an encrypted handwritten message from World War II, found on the leg of a long-dead carrier pigeon in a household chimney in southern England, has thwarted all their efforts to decode it since it was sent to them last month.
1More

Quantum code sent on common fibre - 0 views

  •  
    The "uncrackable codes" made by exploiting the branch of physics called quantum mechanics no longer require the use of special "dark fibres" and have been sent down kilometres of standard broadband fibre.
1More

Edward Snowden | US news | The Guardian - 0 views

  •  
    "Latest on the computer analyst whistleblower who provided the Guardian with top-secret NSA documents leading to revelations about US surveillance on phone and internet communications" - compilation of news sources on Edward Snowden
1More

Tools boast easy cracking of Microsoft crypto for businesses - 0 views

  •  
    Summary: Cryptography specialists have developed tools to crack PPTP encryption (based on an algorithm from Microsoft), gaining access to Wi-Fi, passwords, corporate networks and data.
1More

Britain's GCHQ Uses Online Puzzle to Recruit Hackers - NYTimes.com - 0 views

  •  
    Instead of hiring "upper-class twits from Oxford and Cambridge," A government communications agency tried a new angle on recruiting hackers. They decided to combat hackers with other experienced hackers by posting an online puzzle and offering a job interview to those who solved it.
1More

The Fastest-Ever Random Number Generator Conjures Digits from Subatomic Noise in a Vacuum - 0 views

  •  
    Not directly involving cryptography, but the implications of this definitely affect the field. Now that we have the capability to generate truly random number strings, our ability to encrypt data will improve.
1More

Facial Recognition Is Taking Form in 2014 - 0 views

  •  
    This article talks about the facial recognition used in response to fatal shootings at schools.
1 - 20 of 41 Next › Last »
Showing 20 items per page