Edward Snowden | US news | The Guardian - 0 views
Nikon | The Story of Light and People | Unbreakable encryption with light-Quantum compu... - 0 views
-
Very interesting article that begins with the story of Mary, Queen of Scots, and continues to speak about different techniques of encryption that are harder and harder to break. It also deals with the fact that Mary's messages were being intercepted and the article speaks about secure encryption using photons where you would know if your message was intercepted.
Cracking The Vigenere Cipher - 3 views
Extreme cryptography paves way to personalized medicine - 0 views
-
Encrypted analysis of data in the cloud would allow secure access to sensitive information.
-
Homomorphic encryption is pretty amazing. What they're proposing in this article is a bit like having a computer analyze an encrypted novel and determining which sentences were grammatically incorrect--without even knowing what the plaintext sentences were!
International Association for Cryptologic Research - 2 views
-
The International Association for Cryptologic Research (IACR) is a non-profit scientific organization whose purpose is to further research in cryptology and related fields. Cryptology is the science and practice of designing computation and communication systems which are secure in the presence of adversaries.
Crypto modernization transforms military communications - 1 views
-
Embeddable cryptographic processors are enabling a host of new defense communications applications, such as smartphones and tablet computers for tactical use on the front lines, but should soldiers be using the same object for both secure and insecure communications? Or does this create a conflict of interests?
-
This is an article about the advancement of technology and how it has affected cryptography and secret-keeping during wartime.
They Cracked This 250-Year-Old Code, and Found a Secret Society Inside | WIRED - 1 views
-
I'm just going to resubmit the bookmark directly to this page so I'll be sure it ends up publicly in the group. This wasn't mentioned in Singh chapter 2, but it was created around the time period discussed in the chapter. (Plus, it's one of my favorite articles I've read in Wired so I really wanted to use it as a bookmark.) The article discusses the strategies used to break this cipher, some of which, such as frequency analysis, we have talked about in class. It's also just fascinating to read about the Oculists and their history.
How the Deep Web Works - HowStuffWorks - 0 views
Mental cryptography and good passwords - 4 views
-
This article gives a method for generating secure yet easy to remember passwords for online accounts, using encryption and modular arithmetic (!). It is an interesting use of encryption in everyday life for something we all have, password-protected internet accounts. If you click through to the computer science category, you can find other posts on cryptography, encryption, and privacy.
IBM Says Start Thinking About Quantum-Safe Cryptography Now | Data Center Knowledge - 3 views
Spying on Students: School-Issued Devices and Student Privacy | Electronic Frontier Fou... - 0 views
-
Even when college students use computer or electronic devices that belong to the school, any websites they visit, links they download, and videos they watch can offer behavioral information and data that is directly tied to that student's profile, and thus them too. It's important to be aware of this fact, and realize that whatever privacy you think that Mac in the back of the library offers you is in reality nonexistent. That Mac is uploading your data to the Cloud every minute you use it, and it's important to track and understand that your online information is being sent, without your consent, to other entities. So, be careful with what you search up next time.
‹ Previous
21 - 37 of 37
Showing 20▼ items per page