Skip to main content

Home/ Math 1111: Cryptography/ Group items tagged Some

Rss Feed Group items tagged

Sahand Kalhori

National Security Agency Releases History of Cold War Intelligence Activities - 0 views

  •  
    Discusses some interesting undercover cryptography work during the Cold War era
aconn55

The top 10 unsolved cipher texts - 1 views

  •  
    Many interesting ones in this list. I like the Kryptos at the CIA headquarters. 
  •  
    Here's a list of 10 unsolved cipher texts throughout history, #2 is the Beale Papers covered in the chapter, #8 is Kryptos (the background of our website). Some date back as far as 1400 BC and some are more recent like the Zodiac Killer.
junqing-shi

The Black Chamber - Mary Queen of Scots - 0 views

  •  
    some extension about Marry Queen of Scots and cipher
nate_clause

Beefing up public-key encryption | MIT News Office - 0 views

  •  
    Interesting article on how public-key encryption is used to keep information safe during financial transactions online. The article discusses weakness in basic public-key encryption schemes and how some of these schemes have been improved.
mariannas

Review: Blackphone Trades Some Convenience for Security - 1 views

  •  
    This article is about a smartphone that's designed specifically to help you keep your personal information secure--it lets you easily encrypt your calls and texts and search the internet privately. There's also a video about ways to encrypt your email.
  •  
    Nice find. I'm reminded of DuckDuckGo, https://duckduckgo.com/, the search engine that doesn't track you. At all.
Riley Dankovich

How the Government Is Tracking Your Movements | American Civil Liberties Union - 1 views

  •  
    This article, though very clearly biased, describes the ways in which the movements of citizens are being tracked by both technology and the police. The video/information slides are obviously carried out with bias, but the information is still there. The end of the article has some interesting (helpful?) information about what the judicial system is ruling on cases involving location tracking without warrants.
masonagrow

Everyday Encryption - 1 views

  •  
    Gives information on several uses of crypto in life; provides some information on multiple uses
Adrian Florea

New Crypto Tool Makes Anonymous Surveys Truly Anonymous - 0 views

  •  
    Advice: Although some school surveys are said to be anonymous, it is there probably is some cryptographic way to retrieve a user's identify from a response and what you say could still be potentially traced back to you.
anonymous

What if there's no WhatsApp in China? - 2 views

  •  
    Recently China blocked the Facebook app "Whatsapp," and I find this interesting because by the decision of their government, they can decide your intake of content from the outside world and where to cut it off. Some parts of this relate to Cryptography because people have become very creative in getting around firewalls and accessing blocked sites anyways.
Derek Bruff

Elonka's Kryptos Page - 0 views

  •  
    We'll talk about Kryptos as some point. Elonka Dunin is perhaps the world's expert on this unsolved mystery.
Siegfried Schlunk

Quantum cryptography keys ride the lightning on existing fiber lines - 1 views

  •  
    Quantum computing has teased us with its potential for some time, but we won't be seeing qubits in our laptops anytime soon. However, science has also sought to leverage quantum physics in cryptography, and a recent breakthrough will allow for quantum encryption over fiber optic cables already in use.
Collin Jackson

Gigapixel Images of Babbage's Difference Engine - 0 views

  •  
    This site has some really neat pictures and a video detailing Babbage's Difference Engine. The pictures are gigapixel, so they are incredibly detailed.
  •  
    Wow. That's a lot of zoom.
Tyren Herbst-Ingram

Understanding Cryptography in Modern Military Communications - 0 views

  •  
    A look at some older cryptography used by the military and a look at what they are transitioning to
jcs215

Rabies: Ancient Biological Weapon? - 0 views

  •  
    This blog post interested me with the vast history of rabies, how people attempted to cure those infected, and how some civilizations used this deadly disease to their advantage in times of war.
giordas

Ada Lovelace, the First Tech Visionary - The New Yorker - 1 views

  •  
    Here's just some more information about Ada Lovelace because she's pretty cool.
  •  
    I thought this article was interesting because it mentioned Ada's childhood imagination and inventions. It's interesting to consider what she could've done if she had grown up in a different place or at a different time. Also, the article mentioned that there was a computer program named "Ada" after her and I thought it was pretty cool that she's beginning to be recognized more and more. (Sorry, I don't know why this comment wasn't here earlier. It's in my original Diigo bookmark.)
lvanryzin

These Harvard And MIT Kids Say They've Made NSA-Proof Email - 1 views

  •  
    These people were prompted to create a easy, secure email service. They incorporated in Switzerland as it has much more stringent privacy laws than we have in America.
  •  
    Great find! At some point this semester, we're all going to learn how to use encrypted email. We might try out a few different systems, including ProtonMail, and compare them.
Derek Bruff

99% Invisible | A Tiny Radio Show About Design with Roman Mars - 2 views

  •  
    The latest 99% Invisible podcast episode focuses on locks and lockpicking. I think you'll find some nice parallels with cryptography, especially around Kerckhoff's Principle and the idea of not knowing if your security system has been broken.
Derek Bruff

99% Invisible | A Tiny Radio Show About Design with Roman Mars - 0 views

  •  
    This 99% Invisible podcast episode focuses on locks and lockpicking. I think you'll find some nice parallels with cryptography, especially around Kerckhoff's Principle and the idea of not knowing if your security system has been broken.
Derek Bruff

NSA Plans for a Post-Quantum World - Schneier on Security - 0 views

  •  
    Here's a recent piece by security expert Bruce Schneier on quantum computing, which is different than quantum cryptography. (I conflated the two during class today.) Quantum computing is very fast computing that could be used to quickly break modern encryption schemes. Quantum cryptography involves sending messages that can't be read, since "looking" at them changes the message. Schneier offers some conjectures about where the NSA is with regard to both technologies.
mattgu123

Alan Turing Article in Time Magazine - 0 views

Like the title says, the December 1/8 issue of Time has a pretty interesting article on the life of Alan Turing, with some discussion of the Enigma machine and Colossus.

fywscrypto AlanTuring TimeMagazine

started by mattgu123 on 18 Dec 14 no follow-up yet
1 - 20 of 39 Next ›
Showing 20 items per page