Skip to main content

Home/ Math 1111: Cryptography/ Group items tagged chapter

Rss Feed Group items tagged

mariannas

They Cracked This 250-Year-Old Code, and Found a Secret Society Inside | WIRED - 1 views

  •  
    I'm just going to resubmit the bookmark directly to this page so I'll be sure it ends up publicly in the group. This wasn't mentioned in Singh chapter 2, but it was created around the time period discussed in the chapter. (Plus, it's one of my favorite articles I've read in Wired so I really wanted to use it as a bookmark.) The article discusses the strategies used to break this cipher, some of which, such as frequency analysis, we have talked about in class. It's also just fascinating to read about the Oculists and their history.
estrutt

From Technology-Driven Society to Socially Oriented Technology: The Future of Informati... - 2 views

  •  
    This is a PDF file of a chapter taken from a book that contains essays on many issues that arise from "big data." This chapter specifically pertains to our privacy versus security debate because it provides reasons as to why bulk data collection does not work as well as alternative options to mass surveillance.
Collin Jackson

Steganography and Cryptography Using DNA - 0 views

  •  
    Researchers have applied the microdot principle described by Singh on page 6 to hide messages in DNA sequences.
Siegfried Schlunk

The Bible Codes - 0 views

  •  
    A brief look at the science of cryptology and the simple encryptions found in the Old Testament. Has a couple of examples and explains the three main transformations used.
Malak Elmousallamy

Cryptography and Modular Arithmetic - 0 views

  •  
    A useful document detailing the different substitution ciphers (including the Caesar Shift) and the application of Modular Arithmetic in modern day Cryptography.
Kristin Davis

Cipher Mysteries - 0 views

  •  
    This website has lots of great information on historical ciphers such as the Voynich Cipher and the Dorabella Cipher.
Alberto Perez

The National Archives | Research, education & online exhibitions | Exhibitions | Secret... - 0 views

  •  
    The Babington plot, which was the undoing of Mary, Queen of Scots, was one of several conspiracies against Elizabeth I that were uncovered. The Ridolfi Plot In 1571 a plot was discovered involving Philip II of Spain, Pope Pius V and the Duke of Norfolk, as well as Mary's advisor, the Bishop of Ross, and Mary herself.
Emily Dinino

For Whose Eyes Only? - 0 views

  •  
    Cryptanalysis and Frequency Analysis
Annie Vreeland

Mary, Queen of Scots (1542-1587) - 0 views

  •  
    An in depth summary about Mary, Queen of Scots, and the people she encountered.
sareennl

Spartan Scytale - 1 views

  •  
    This website details how the Spartan scytale was used in 500 B.C. Also features a program that encodes your own message according to the spartan scytale.
Justin Yeh

Caesar Shift Cipher - 0 views

  •  
    An in-depth description of Julius Caesar's shift cipher and how it works. Also shows how to use frequency analysis and chi-square values to quickly break the cipher.
Hannah Lee

Computer Scientists Break Security Token Key in Record Time - NYTimes.com - 0 views

  •  
    A breach in supposedly secure keys given to employees by private companies vindicates previous warnings by cryptographers that companies should use more difficult keys, and that companies have not been cautious enough using such keys because of their assumed security.
Ryan McLaughlin

Nikon | The Story of Light and People | Unbreakable encryption with light-Quantum compu... - 0 views

  •  
    Very interesting article that begins with the story of Mary, Queen of Scots, and continues to speak about different techniques of encryption that are harder and harder to break. It also deals with the fact that Mary's messages were being intercepted and the article speaks about secure encryption using photons where you would know if your message was intercepted.
aconn55

The top 10 unsolved cipher texts - 1 views

  •  
    Many interesting ones in this list. I like the Kryptos at the CIA headquarters. 
  •  
    Here's a list of 10 unsolved cipher texts throughout history, #2 is the Beale Papers covered in the chapter, #8 is Kryptos (the background of our website). Some date back as far as 1400 BC and some are more recent like the Zodiac Killer.
Ling Shi

Cryptography in Network Security - 2 views

  •  
    This is the e-text of a book that discusses online network encryption and application. The chapters cover various encryption methods for the transfer of data online, as well as the application of wireless, email, IP network security
saraatsai

National Institute of Justice Research Report: Chapter 2-Video Surveillance: Video Came... - 0 views

  •  
    "Signage can be an important legal component in the use of video cameras in schools. As mentioned in the previous section, it is important that the presence of video cameras not lead a person to believe he or she will be rescued if attacked."
1 - 18 of 18
Showing 20 items per page