Skip to main content

Home/ Math 1111: Cryptography/ Group items tagged crypto

Rss Feed Group items tagged

dumessn

5 Essential Privacy Tools For The Next Crypto War - Forbes - 5 views

  •  
    Gives you tools to make sure your information is safe.
  •  
    One word of caution: This piece is from 2012, before we learned what the NSA was up to. It's quite possible that some of these mechanisms are now known to be insecure.
sareennl

Tools boast easy cracking of Microsoft crypto for businesses - 0 views

  •  
    Summary: Cryptography specialists have developed tools to crack PPTP encryption (based on an algorithm from Microsoft), gaining access to Wi-Fi, passwords, corporate networks and data.
colleengill

How NSA and GCHQ spied on the Cold War world - BBC News - 0 views

  •  
    This article describes how, during the Cold War, the major distributor of cryptography machines (Crypto AG) worked with the NSA. This professional relationship provided the NSA with shortcuts on how to break ciphers created from the different machines. Also, Crypto AG was revealed as not having given the most up to date models to all countries, probably through deception. This raises the question of morality involving basic warfare. How is it moral for this supposedly trusted third party company to have special allegiances with the United States?Would the United States have the same opinion on this actions morality if they were the ones being sold out of date equipment? Or if one of their opponents had shortcuts?
kims46

Matt Blaze / crypto.com - 1 views

  •  
    "Matt Blaze directs the Distributed Systems Lab at the University of Pennsylvania." This site links to his blog and research papers regarding topics of cryptography.
saraatsai

Crypto modernization transforms military communications - 1 views

  •  
    Embeddable cryptographic processors are enabling a host of new defense communications applications, such as smartphones and tablet computers for tactical use on the front lines, but should soldiers be using the same object for both secure and insecure communications? Or does this create a conflict of interests?
  •  
    This is an article about the advancement of technology and how it has affected cryptography and secret-keeping during wartime.
Derek Bruff

@derekbruff/Crypto on Twitter - 4 views

shared by Derek Bruff on 12 Nov 14 - No Cached
  •  
    My short list of people to follow on Twitter who tweet about cryptography, security, and privacy.
masonagrow

Everyday Encryption - 1 views

  •  
    Gives information on several uses of crypto in life; provides some information on multiple uses
Adrian Florea

New Crypto Tool Makes Anonymous Surveys Truly Anonymous - 0 views

  •  
    Advice: Although some school surveys are said to be anonymous, it is there probably is some cryptographic way to retrieve a user's identify from a response and what you say could still be potentially traced back to you.
Derek Bruff

cryptocat - 1 views

  •  
    "Cryptocat allows you to instantly set up secure conversations. It's an open source encrypted, private alternative to invasive services such as Facebook chat."
  •  
    "Cryptocat allows you to instantly set up secure conversations. It's an open source encrypted, private alternative to invasive services such as Facebook chat."
Siegfried Schlunk

Siemens T-43 - 0 views

  •  
    A basic overview of the Siemens T-43 cipher machine used by the Germans, the first mixer machine of its kind.
1 - 20 of 41 Next › Last »
Showing 20 items per page