Skip to main content

Home/ Math 1111: Cryptography/ Group items tagged of

Rss Feed Group items tagged

saraatsai

Crypto modernization transforms military communications - 1 views

  •  
    Embeddable cryptographic processors are enabling a host of new defense communications applications, such as smartphones and tablet computers for tactical use on the front lines, but should soldiers be using the same object for both secure and insecure communications? Or does this create a conflict of interests?
  •  
    This is an article about the advancement of technology and how it has affected cryptography and secret-keeping during wartime.
mattgu123

Alan Turing Article in Time Magazine - 0 views

Like the title says, the December 1/8 issue of Time has a pretty interesting article on the life of Alan Turing, with some discussion of the Enigma machine and Colossus.

fywscrypto AlanTuring TimeMagazine

started by mattgu123 on 18 Dec 14 no follow-up yet
Derek Bruff

Why I'm sending 200 copies of Little Brother to a high-school in Pensacola, FL - Boing ... - 1 views

  •  
    After a high school principle pulls the plug on a plan to use Little Brother as a common reading, Cory Doctorow sends the school 200 copies of the book for free. Good man.
Derek Bruff

Firesheep Users May Be Breaking the Law - Kashmir Hill - The Not-So Private Parts - Forbes - 0 views

  •  
    "The legality of using Firesheep is less wooly when it comes to the Computer Fraud and Abuse Act, which criminalizes accessing computer systems without authorization."
  •  
    "The legality of using Firesheep is less wooly when it comes to the Computer Fraud and Abuse Act, which criminalizes accessing computer systems without authorization."
junqing-shi

The Black Chamber - Mary Queen of Scots - 0 views

  •  
    some extension about Marry Queen of Scots and cipher
aconn55

'Black Box' Software Could Be the Future of Cryptography - 2 views

  •  
    Securing data is how we currently operate, securing software could be the future of internet security.
mariannas

Online Shopping | StaySafeOnline.org - 0 views

  •  
    Keep a paper trail: Print and save records of your online transactions, including the product description, price, online receipt, terms of the sale, and copies of any email exchange with the seller. Read your credit card statements as soon as you get them to make sure there aren't any unauthorized charges.
Ling Shi

Cryptography in Network Security - 2 views

  •  
    This is the e-text of a book that discusses online network encryption and application. The chapters cover various encryption methods for the transfer of data online, as well as the application of wireless, email, IP network security
kims46

Everyday Uses of Encryption -CodeIdol - 1 views

  •  
    This source gives a variety of examples in which encryption is used for security everyday, like ATM machines and DVD players. It seems like this is a pretty useful list because it goes into sufficient enough depth to describing the different examples, and specifically explains how encryption comes into play - without making it too long or hard to understand.
whitnese

3 Tools To Simplify Your Life -- And Protect You From Hackers - 2 views

  •  
    The recent news that someone using your computer can see all of your passwords stored in Chrome with a few clicks made me aware of something that I had known -- but ignored -- for a long time: I have five or six passwords for dozens of accounts. ...
ftiet21

After Paris, What We're Getting Wrong In 'Privacy vs. Security' Debate - 5 views

  •  
    This article discusses the faults in former deputy director of the CIA Michael Morell's statement that the use of encrypted apps made it difficult to stop terrorists. Claims that encrypted communications put them out of reach was false - there had been no change in al Qaeda tactics. Also, author Howard points out that there isn't a clear dichotomy between privacy and security.
Abbey Roberts

What Americans think about NSA surveillance, national security and privacy - 4 views

  •  
    This is the results of a Pew Research survey in May (of 2015) regarding Americans' opinions of the NSA, surveillance, national security, etc. This could be useful in the security vs. privacy paper, to look at the public opinion on these issues.
saraatsai

Cryptography in Everyday Life - 3 views

  •  
    This page is from the University of Texas, and it describes different aspects of cryptography in everyday life. For instance, it explains how cryptography plays a large role in authentication, digital money, and time stamping. I liked this webpage because it had a lot of different examples with clear explanations.
Derek Bruff

Cotton Responds to Apple CEO Tim Cook's Comments on 60 Minutes | Tom Cotton | U.S. Sena... - 0 views

  •  
    Here's Tom Cotton's statement. Note the mention of 3 of the 4 Horsemen of the Infocalypse.
safwaan

The Paradox Of The False Positive - YouTube - 0 views

  •  
    If anyone is struggling with the concept of "the paradox of the false positive" you might find this useful!
Marco Tiburcio

Step 1: Post Elusive Proof. Step 2: Watch Fireworks. - 0 views

  •  
    Online collaboration over the claimed proof "P versus NP" demonstrates the potential of the internet in the field of mathematical and intellectual research alike. The proof "P versus NP," if verified, would make obsolete modern cryptography, which works under the assumption that P does not equal NP.
Siegfried Schlunk

Quantum processor's prime feat raises security issues | ZDNet - 0 views

  •  
    Summary: California researchers report a breakthrough with the creation of a solid-state quantum processor that could ultimately have a bearing on future cryptographic techniques. Researchers in California have designed and built a quantum processor capable of factoring 15 into its primes - with major implications for computer security.
Annie Vreeland

How 18th-Century Copiale Cipher Was Cracked - 0 views

  •  
    A description of how the Copiale Cipher was cracked. 
Justin Yeh

Getting Slower And Slower: How Slow Can You Go? : Krulwich Wonders... : NPR - 0 views

  •  
    Speed is generally considered exciting, but this blog post takes a different approach. It uses interesting examples, both foreign and familiar, to create a relative scale of speed. It is extremely easy to understand and informative. 
« First ‹ Previous 61 - 80 of 294 Next › Last »
Showing 20 items per page