Skip to main content

Home/ Math 1111: Cryptography/ Group items matching "cipher" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
aconn55

The top 10 unsolved cipher texts - 1 views

  •  
    Many interesting ones in this list. I like the Kryptos at the CIA headquarters. 
  •  
    Here's a list of 10 unsolved cipher texts throughout history, #2 is the Beale Papers covered in the chapter, #8 is Kryptos (the background of our website). Some date back as far as 1400 BC and some are more recent like the Zodiac Killer.
whitnese

Cracking The Vigenere Cipher - 3 views

  •  
    This post is about cracking the vigenere cipher. It also uses computer programming to solve it which I found interesting.
hamzapatel123

Could There Have Been a Revision of Beale's Letters? - 1 views

  •  
    I found this interesting because it mentions the fact that there may have been a revision to the Beale cipher before it was published.
Abbey Roberts

Dying cipher suites are stinking up TLS with man-in-the-middle vulns - 0 views

  •  
    Example of how improving technology requires new encryption that hasn't yet been cracked
mariannas

They Cracked This 250-Year-Old Code, and Found a Secret Society Inside | WIRED - 1 views

  •  
    I'm just going to resubmit the bookmark directly to this page so I'll be sure it ends up publicly in the group. This wasn't mentioned in Singh chapter 2, but it was created around the time period discussed in the chapter. (Plus, it's one of my favorite articles I've read in Wired so I really wanted to use it as a bookmark.) The article discusses the strategies used to break this cipher, some of which, such as frequency analysis, we have talked about in class. It's also just fascinating to read about the Oculists and their history.
junqing-shi

The Black Chamber - Mary Queen of Scots - 0 views

  •  
    some extension about Marry Queen of Scots and cipher
Siegfried Schlunk

Siemens T-43 - 0 views

  •  
    A basic overview of the Siemens T-43 cipher machine used by the Germans, the first mixer machine of its kind.
Alberto Perez

The National Archives | Research, education & online exhibitions | Exhibitions | Secrets and Spies - 0 views

  •  
    The Babington plot, which was the undoing of Mary, Queen of Scots, was one of several conspiracies against Elizabeth I that were uncovered. The Ridolfi Plot In 1571 a plot was discovered involving Philip II of Spain, Pope Pius V and the Duke of Norfolk, as well as Mary's advisor, the Bishop of Ross, and Mary herself.
Derek Bruff

Math 115: Breaking the Vigenere by Derek Bruff on Prezi - 0 views

  •  
    Here's the Prezi I shared today on the Vigenere cipher.
kims46

Kerckhoffs' history and principles of military cryptography, translated and adnotated. | Contravex: A blog by Pete Dushenski - 1 views

  •  
    This is a cryptography blogger's translation of Kerckhoff's article about military cryptography. He denotes that secret methods of communication are limited to higher officers due to potential leakage; but by limiting cryptographic use, are they potentially putting at risk the safety of lesser positions in order to keep the secrecy of their cipher methods? Is this just the inevitable nature of cryptography in general?
colleengill

How NSA and GCHQ spied on the Cold War world - BBC News - 0 views

  •  
    This article describes how, during the Cold War, the major distributor of cryptography machines (Crypto AG) worked with the NSA. This professional relationship provided the NSA with shortcuts on how to break ciphers created from the different machines. Also, Crypto AG was revealed as not having given the most up to date models to all countries, probably through deception. This raises the question of morality involving basic warfare. How is it moral for this supposedly trusted third party company to have special allegiances with the United States?Would the United States have the same opinion on this actions morality if they were the ones being sold out of date equipment? Or if one of their opponents had shortcuts?
Abbey Roberts

Lincoln and the cipher operators - 1 views

  •  
    Describes the personal relationship between President Abraham Lincoln and those who encoded military telegraph messages during the Civil War
giordas

BA jihadist relied on Jesus-era encryption - 0 views

  •  
    Interesting article that shows how even though we think we're very advanced at cryptography, sometimes an old and outdated technique slips through the cracks in our defenses.
‹ Previous 21 - 40 of 48 Next ›
Showing 20 items per page