Skip to main content

Home/ Math 1111: Cryptography/ Group items tagged chapter1

Rss Feed Group items tagged

Collin Jackson

Steganography and Cryptography Using DNA - 0 views

  •  
    Researchers have applied the microdot principle described by Singh on page 6 to hide messages in DNA sequences.
Siegfried Schlunk

The Bible Codes - 0 views

  •  
    A brief look at the science of cryptology and the simple encryptions found in the Old Testament. Has a couple of examples and explains the three main transformations used.
Malak Elmousallamy

Cryptography and Modular Arithmetic - 0 views

  •  
    A useful document detailing the different substitution ciphers (including the Caesar Shift) and the application of Modular Arithmetic in modern day Cryptography.
Kristin Davis

Cipher Mysteries - 0 views

  •  
    This website has lots of great information on historical ciphers such as the Voynich Cipher and the Dorabella Cipher.
Alberto Perez

The National Archives | Research, education & online exhibitions | Exhibitions | Secret... - 0 views

  •  
    The Babington plot, which was the undoing of Mary, Queen of Scots, was one of several conspiracies against Elizabeth I that were uncovered. The Ridolfi Plot In 1571 a plot was discovered involving Philip II of Spain, Pope Pius V and the Duke of Norfolk, as well as Mary's advisor, the Bishop of Ross, and Mary herself.
Emily Dinino

For Whose Eyes Only? - 0 views

  •  
    Cryptanalysis and Frequency Analysis
Justin Yeh

Caesar Shift Cipher - 0 views

  •  
    An in-depth description of Julius Caesar's shift cipher and how it works. Also shows how to use frequency analysis and chi-square values to quickly break the cipher.
Hannah Lee

Computer Scientists Break Security Token Key in Record Time - NYTimes.com - 0 views

  •  
    A breach in supposedly secure keys given to employees by private companies vindicates previous warnings by cryptographers that companies should use more difficult keys, and that companies have not been cautious enough using such keys because of their assumed security.
Ryan McLaughlin

Nikon | The Story of Light and People | Unbreakable encryption with light-Quantum compu... - 0 views

  •  
    Very interesting article that begins with the story of Mary, Queen of Scots, and continues to speak about different techniques of encryption that are harder and harder to break. It also deals with the fact that Mary's messages were being intercepted and the article speaks about secure encryption using photons where you would know if your message was intercepted.
1 - 9 of 9
Showing 20 items per page