Skip to main content

Home/ Math 1111: Cryptography/ Group items tagged cryptography

Rss Feed Group items tagged

Annie Vreeland

How 18th-Century Copiale Cipher Was Cracked - 0 views

  •  
    A description of how the Copiale Cipher was cracked. 
Hannah Lee

BBC News - Privacy project uses cryptography to reduce shared info - 0 views

  •  
    This article describes efforts to create an "electronic wallet" to make sharing confidential information more secure and efficient.
Justin Yeh

Al-Qaeda's Embrace of Encryption Technology: 2007-2011 - 0 views

  •  
    An overview of Al-Qaeda's use of encryption technology in their terrorist activities. Relevant to the debate about distributing powerful cryptography to everyone, including those with bad intentions.
Derek Bruff

Beneblog: Technology Meets Society: Benetech's Human Rights Spin-off - 0 views

  •  
    During one of our classes, we briefly discussed the use of cryptography to protect eyewitness and victim information during the investigation of human rights violations. The individual I mentioned that day was Patrick Ball, who now will lead a new organization focused on "the data-driven and scientific side of analyzing human rights violations around the world."
michaelpollack

Mary Queen of Scots - 0 views

  •  
    A brief history on Mary, Queen of Scots, and her secret plotting against Queen Elizabeth.
Emily Dinino

For Whose Eyes Only? - 0 views

  •  
    Cryptanalysis and Frequency Analysis
Ryan McLaughlin

Nikon | The Story of Light and People | Unbreakable encryption with light-Quantum compu... - 0 views

  •  
    Very interesting article that begins with the story of Mary, Queen of Scots, and continues to speak about different techniques of encryption that are harder and harder to break. It also deals with the fact that Mary's messages were being intercepted and the article speaks about secure encryption using photons where you would know if your message was intercepted.
sareennl

Tools boast easy cracking of Microsoft crypto for businesses - 0 views

  •  
    Summary: Cryptography specialists have developed tools to crack PPTP encryption (based on an algorithm from Microsoft), gaining access to Wi-Fi, passwords, corporate networks and data.
Ryan McLaughlin

Britain's GCHQ Uses Online Puzzle to Recruit Hackers - NYTimes.com - 0 views

  •  
    Instead of hiring "upper-class twits from Oxford and Cambridge," A government communications agency tried a new angle on recruiting hackers. They decided to combat hackers with other experienced hackers by posting an online puzzle and offering a job interview to those who solved it.
Collin Jackson

The Fastest-Ever Random Number Generator Conjures Digits from Subatomic Noise in a Vacuum - 0 views

  •  
    Not directly involving cryptography, but the implications of this definitely affect the field. Now that we have the capability to generate truly random number strings, our ability to encrypt data will improve.
mackense

BBC News - Who is winning the 'crypto-war'? - 0 views

  •  
    In the war over encryption between the NSA and privacy activists, at first it seemed as though the activists had won - but now it's not so clear.
  •  
    This was shared with the group! Did you do anything different this time? Your comment appeared twice, but that's fine.
  •  
    I didn't do anything different! It must have appeared twice because I posted it twice.
Allison Molo

Vigenere cipher encryption | Ciphers | Khan Academy - 0 views

  •  
    Good link from Khan Academy that has good practice questions/explanation of the Vigenere cipher.
colleengill

How NSA and GCHQ spied on the Cold War world - BBC News - 0 views

  •  
    This article describes how, during the Cold War, the major distributor of cryptography machines (Crypto AG) worked with the NSA. This professional relationship provided the NSA with shortcuts on how to break ciphers created from the different machines. Also, Crypto AG was revealed as not having given the most up to date models to all countries, probably through deception. This raises the question of morality involving basic warfare. How is it moral for this supposedly trusted third party company to have special allegiances with the United States?Would the United States have the same opinion on this actions morality if they were the ones being sold out of date equipment? Or if one of their opponents had shortcuts?
Derek Bruff

99% Invisible | A Tiny Radio Show About Design with Roman Mars - 2 views

  •  
    The latest 99% Invisible podcast episode focuses on locks and lockpicking. I think you'll find some nice parallels with cryptography, especially around Kerckhoff's Principle and the idea of not knowing if your security system has been broken.
Derek Bruff

99% Invisible | A Tiny Radio Show About Design with Roman Mars - 0 views

  •  
    This 99% Invisible podcast episode focuses on locks and lockpicking. I think you'll find some nice parallels with cryptography, especially around Kerckhoff's Principle and the idea of not knowing if your security system has been broken.
yuthraju

International Association for Cryptologic Research - 2 views

  •  
    The International Association for Cryptologic Research (IACR) is a non-profit scientific organization whose purpose is to further research in cryptology and related fields. Cryptology is the science and practice of designing computation and communication systems which are secure in the presence of adversaries.
« First ‹ Previous 61 - 80 of 126 Next › Last »
Showing 20 items per page