Skip to main content

Home/ Math 1111: Cryptography/ Group items tagged US

Rss Feed Group items tagged

andrewhaygood97

Google Is Powering A New Search Engine That Digs Internet's Dirty Secrets - 1 views

  •  
    I think it's pretty interesting that one of the world's largest internet corporations is going to find the security vulnerabilities of our modems and routers. Will they just be helping us fix them, or using the errors for their own gain?
  •  
    I think it's pretty interesting that one of the world's largest internet corporations is going to find the security vulnerabilities of our modems and routers. Will they just be helping us fix them, or using the errors for their own gain?
Hannah Lee

Bletchley Park : The Machines - 0 views

  •  
    Gives a description of all of the machines used or developed at Bletchley Park for use in cryptanalysis. 
Hannah Lee

Computer Scientists Break Security Token Key in Record Time - NYTimes.com - 0 views

  •  
    A breach in supposedly secure keys given to employees by private companies vindicates previous warnings by cryptographers that companies should use more difficult keys, and that companies have not been cautious enough using such keys because of their assumed security.
nate_clause

CrypTool-Online / Ciphers / Gronsfeld - 3 views

  •  
    This outlines the gronsfeld cipher, which is a modification of the vigenere cipher. I like and find this cipher interesting because of it using numbers instead of letters, and I like cryptography which uses numbers.
  •  
    Interesting. Gronsfeld ciphers then form a subset of Vigenere ciphers. That is, there's a one-to-one correspondence between Gronsfeld ciphers and Vigenere ciphers where keywords are formed from the letters A through J.
Derek Bruff

Reporting Error Leads To Speculation That Terrorists Used PS4s To Plan Paris Attacks - 1 views

  •  
    No credible evidence that the PlayStation 4 network was used to coordinate the #ParisAttacks. #fywscrypto https://t.co/8g6Gki4QVj - Derek Bruff (@derekbruff) November 17, 2015
kims46

Everyday Uses of Encryption -CodeIdol - 1 views

  •  
    This source gives a variety of examples in which encryption is used for security everyday, like ATM machines and DVD players. It seems like this is a pretty useful list because it goes into sufficient enough depth to describing the different examples, and specifically explains how encryption comes into play - without making it too long or hard to understand.
masonagrow

Everyday Encryption - 1 views

  •  
    Gives information on several uses of crypto in life; provides some information on multiple uses
Abbey Roberts

Edward Snowden | US news | The Guardian - 0 views

  •  
    "Latest on the computer analyst whistleblower who provided the Guardian with top-secret NSA documents leading to revelations about US surveillance on phone and internet communications" - compilation of news sources on Edward Snowden
mattgu123

Kasiski Analysis Online Tool - 5 views

  •  
    For longer ciphers, Kasiski analysis is useful for determining possible keywords using a modified frequency analysis and repetition analysis. This is an online tool to find repeat sequences in a ciphertext, and can be used to quickly decrypt a Vigenere ciphertext.
masonagrow

A Brief History of Cryptography | Red Hat Security - 0 views

  •  
    Cryptology is a young science. Though it has been used for thousands of years to hide secret messages, systematic study of cryptology as a science (and perhaps an art) just started around one hundr...
  •  
    Cryptology is a young science. Though it has been used for thousands of years to hide secret messages, systematic study of cryptology as a science (and perhaps an art) just started around one hundr...
Derek Bruff

Firesheep Users May Be Breaking the Law - Kashmir Hill - The Not-So Private Parts - Forbes - 0 views

  •  
    "The legality of using Firesheep is less wooly when it comes to the Computer Fraud and Abuse Act, which criminalizes accessing computer systems without authorization."
  •  
    "The legality of using Firesheep is less wooly when it comes to the Computer Fraud and Abuse Act, which criminalizes accessing computer systems without authorization."
Derek Bruff

U.S. wants Apple to help unlock iPhone used by San Bernardino shooter - The Washington ... - 0 views

  •  
    Heads up... big crypto story happening now.
j_olsen

Technology Turns to Tracking People Offline - 0 views

  •  
    Some retailers use Euclid Analytics, which uses the Wi-Fi antennas inside stores to see how many people are coming into a store, how long they stay and even which aisles they walk. It does this by using signals from each smartphone that comes near the store.
estrutt

Walk the Walk: Gait Recognition Technology Could Identify Humans at a Distance - 1 views

  •  
    Interesting how this article talks about the gait analysis being used for catching terrorists, while in Little Brother, it was used to keep track of the high school students. The technology is not quite ready to be used, but seems to be much more reliable than the gait trackers in the book.
  •  
    Georgia Tech Research Institute is making gait recognition technology a reality. "The ultimate goal is to detect, classify and identify humans at distances up to 500 feet away under day or night, all-weather conditions. Such capabilities will enhance the protection of U.S. forces and facilities from terrorist attacks."
hbatson

Citizen surveillance: What does the US Government know about you? - 1 views

  •  
    What are the mechanisms behind surveillance? How precisely are people surveilled in the US?
Kristin Davis

BBC - Future-Intelligence agencies turn to crowdsourcing - 0 views

  •  
    This article on how the CIA is using crowdsourcing to make intelligence more accurate is particularly well written because if its inclusion of a quick attention draw with the reference to the new James Bond movie, good historical background, an inviting writing style that includes rhetorical questions, and interviews with experts that add to the legitimacy of the article. 
Justin Yeh

Getting Slower And Slower: How Slow Can You Go? : Krulwich Wonders... : NPR - 0 views

  •  
    Speed is generally considered exciting, but this blog post takes a different approach. It uses interesting examples, both foreign and familiar, to create a relative scale of speed. It is extremely easy to understand and informative. 
Emily Dinino

The Smart Scanner That May Put Shampoo Back Into Your Carry-on | Weapons & Security | D... - 0 views

  •  
    I thought this post was incredibly well written, starting with the title. The title is captivating and draws readers in by suggesting a solution to a common annoyance. The article also addresses the bigger scientific achievement: this scanner may be useful for medical purposes such as measuring glucose levels or cancer cell levels at tumor sites. The article provides sufficient, interesting information while creatively tying in witty humor. 
Siegfried Schlunk

Quantum cryptography keys ride the lightning on existing fiber lines - 1 views

  •  
    Quantum computing has teased us with its potential for some time, but we won't be seeing qubits in our laptops anytime soon. However, science has also sought to leverage quantum physics in cryptography, and a recent breakthrough will allow for quantum encryption over fiber optic cables already in use.
Derek Bruff

U.S. intelligence mining data from nine U.S. Internet companies in broad secret program... - 0 views

  •  
    Has the government been reading your email, Facebook posts, tweets, etc.? Yes, yes they have.
1 - 20 of 150 Next › Last »
Showing 20 items per page