Skip to main content

Home/ Math 1111: Cryptography/ Group items tagged Military

Rss Feed Group items tagged

Tyren Herbst-Ingram

Understanding Cryptography in Modern Military Communications - 0 views

  •  
    A look at some older cryptography used by the military and a look at what they are transitioning to
kims46

Kerckhoffs' history and principles of military cryptography, translated and adnotated. ... - 1 views

  •  
    This is a cryptography blogger's translation of Kerckhoff's article about military cryptography. He denotes that secret methods of communication are limited to higher officers due to potential leakage; but by limiting cryptographic use, are they potentially putting at risk the safety of lesser positions in order to keep the secrecy of their cipher methods? Is this just the inevitable nature of cryptography in general?
Abbey Roberts

Can you keep a secret? The Bletchley codebreakers 70 years on - Telegraph - 4 views

  •  
    Interesting article describing the people who worked at Bletchley Park (UK) during WWII and the secrecy act that kept them silent. The article makes compelling comparisons to people today like Edward Snowden, who are legally bound to secrecy but ignore it. What are the ethical implications of being asked to keep military secrets? Of sharing military secrets? How do the differences between today's generation and the WWII generation affect how these ethics are viewed?
ftiet21

Christos military and intelligence corner - 1 views

  •  
    This blog contains vast amounts of information dealing with military cryptography, both in the past and the present. One of the recent articles discussed the morality of utilizing military level cryptography to ensure complete surveillance of civilians, and whether or not it should be allowed.
saraatsai

Crypto modernization transforms military communications - 1 views

  •  
    Embeddable cryptographic processors are enabling a host of new defense communications applications, such as smartphones and tablet computers for tactical use on the front lines, but should soldiers be using the same object for both secure and insecure communications? Or does this create a conflict of interests?
  •  
    This is an article about the advancement of technology and how it has affected cryptography and secret-keeping during wartime.
Ling Shi

Advanced Military Cryptography - 3 views

  •  
    A pre-WWII NSA document on advanced military cryptography which was declassified in 2014. This leads to the question of what impact disclosing these military secrets has on encryption and decryption of messages in future wars, and also why were these documents released in the first place.
Emily Dinino

Early U.S. military cryptography - 0 views

  •  
    A description of the U.S. military's first cryptographic system.
j_olsen

Zimmermann Telegram - illegal UK interception of US cable in 1917 to aid war effort - 1 views

  •  
    This blog has information about military cryptography and privacy in general, including this post about the Zimmermann Telegram. Is it ethical to lie to an ally if it is in their best interest? What are the ethics behind spying on one's allies? Do ethics hinder one's ability to win a war, and if so, should ethics be disregarded in times of war? Another interesting post examines how Snowden should be viewed as a patriot, not a traitor. This made me question where one's loyalty should remain- to the government or to the people?
andrewhaygood97

Military encryption's going open -- Defense Systems - 2 views

  •  
    This makes me wonder how ethical it is for the NSA to be so heavily involved in cryptography internationally. Are they building a backdoor into these crytographic systems? If so, how ethical could that be?
charlotteneuhoff

Military Embedded Systems - 0 views

  •  
    This resource provides access to articles, news, and blog posts regarding military embedded systems, often using cryptography. One article referenced the cryptography used to secure "Data at Rest" and the length at which this information should be held secure. Is it ethical to keep this information from the public when safety is no longer a concern? At what point should these well-kept secrets become accessible?
Abbey Roberts

Lincoln and the cipher operators - 1 views

  •  
    Describes the personal relationship between President Abraham Lincoln and those who encoded military telegraph messages during the Civil War
yuthraju

Military Cryptanalysis- NSA/CSS - 3 views

  •  
    Now that the NSA has declassified this information about cryptanalysis, either they can no longer utilize these methods of cryptography, or must do so with caution, knowing that anyone has the resources to crack them. Was it ethical of the NSA to release this information, especially if other countries still use these methods to create ciphers?
Collin Jackson

WWII pigeon message stumps GCHQ - 0 views

  •  
    Continuation of a story I posted a while ago. Britain's top code-breakers say they are stumped by a secret code found on the leg of a dead pigeon. .
Annie Vreeland

Pearl Harbor Review - JN-25 - NSA/CSS - 1 views

  •  
    JN-25: code used during and slightly before world war II
Marco Tiburcio

Top Secret: the Stager ciphers in the Civil War - 0 views

  •  
    The cipher described in this article was so secret that even President Lincoln "was denied access to the codes."
1 - 20 of 39 Next ›
Showing 20 items per page