Skip to main content

Home/ Math 1111: Cryptography/ Group items matching "A" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
1More

Fossil insect hid by carrying a basket of trash - 0 views

  •  
    I found this article to be well written and interesting because of the conversational and casual way it was written. The idea that one needs to remove all pronouns from scientific writing is one that is hammered into students from high school science day 1, yet may not be true. This was not written in the way that I was taught to write about science, however, it was both easy to read and informative. The casual writing style of science blogs may influence other writing standards of other areas of science in the future.
1More

Saving the bacon during the first world war - 0 views

  •  
    I thought this was a well written article because the author is informative without being too dry in her descriptions. Blogs do tend to be more conversational and this one is no exception. The academic focus on this relatively historic topic is still present, but the article is written for a wider audience than the academic community.
1More

Glaciers Lose 204 Billion Tons of Ice in Three Years - 0 views

  •  
    This writer did a good job of keeping an informal tone without being too casual. It was an easy read and they connected the topic to other areas of science. The little bit of humor was a really nice touch too!
1More

How con artists trick your mind - 1 views

  •  
    This blog post was a very entertaining and read. The concept that the reason people get scammed because of their strengths (trust in authority/desire to follow) and not our weaknesses is a bit mind boggling. It was very well written and kept me interested throughout the entire post.
1More

Crypto Club: Crack a Substitution Cipher - 4 views

  •  
    A more user-friendly wAy to work on monoAlphAbetic substitution ciphers, includes frequency chArts
1More

Vigenère Cipher - 2 views

  •  
    Interesting to read a little more about the history of the Vigenere Cipher. also explains how it is cracked.
2More

These Harvard and MIT Kids Say They've Made NSa-Proof Email - 1 views

  •  
    These people were prompted to create a easy, secure email service. They incorporated in Switzerland as it has much more stringent privacy laws than we have in america.
  •  
    Great find! at some point this semester, we're all going to learn how to use encrypted email. We might try out a few different systems, including ProtonMail, and compare them.
1More

The Black Chamber - Vigenère Cipher - 1 views

  •  
    This website gives a good description about the Vigenère cipher and techniques for cracking it. It also shows another way we could more easily crack one of these ciphers using Microsoft Excel. Lastly, on the menu on the left side of the page is a link that lets you contact Simon Singh.
1More

Could There Have Been a Revision of Beale's Letters? - 1 views

  •  
    I found this interesting because it mentions the fact that there may have been a revision to the Beale cipher before it was published.
1More

Military encryption's going open -- Defense Systems - 2 views

  •  
    This makes me wonder how ethical it is for the NSa to be so heavily involved in cryptography internationally. are they building a backdoor into these crytographic systems? If so, how ethical could that be?
1More

Kerckhoffs' history and principles of military cryptography, translated and adnotated. ... - 1 views

  •  
    This is a cryptography blogger's translation of Kerckhoff's article about military cryptography. He denotes that secret methods of communication are limited to higher officers due to potential leakage; but by limiting cryptographic use, are they potentially putting at risk the safety of lesser positions in order to keep the secrecy of their cipher methods? Is this just the inevitable nature of cryptography in general?
2More

Extreme cryptography paves way to personalized medicine - 0 views

  •  
    Encrypted analysis of data in the cloud would allow secure access to sensitive information.
  •  
    Homomorphic encryption is pretty amazing. What they're proposing in this article is a bit like having a computer analyze an encrypted novel and determining which sentences were grammatically incorrect--without even knowing what the plaintext sentences were!
1More

NSA PlAns for A Post-QuAntum World - Schneier on Security - 0 views

  •  
    Here's a recent piece by security expert Bruce Schneier on quantum computing, which is different than quantum cryptography. (I conflated the two during class today.) Quantum computing is very fast computing that could be used to quickly break modern encryption schemes. Quantum cryptography involves sending messages that can't be read, since "looking" at them changes the message. Schneier offers some conjectures about where the NSa is with regard to both technologies.
1More

A Few Thoughts on CryptogrAphic Engineering - 4 views

  •  
    This is an interesting cryptography blog by Matthew Green, a cryptographer and professor at Johns Hopkins University.
1More

Schneier on Security - 2 views

  •  
    This is a blog by Bruce Schneier who writes about security in general, under which cryptography falls as a subject.
1More

Cryptography | Red Hat Security - 0 views

  •  
    A security blog creAted by A multinAtionAl softwAre compAny.
2More

Crypto modernization transforms military communications - 1 views

  •  
    Embeddable cryptographic processors are enabling a host of new defense communications applications, such as smartphones and tablet computers for tactical use on the front lines, but should soldiers be using the same object for both secure and insecure communications? Or does this create a conflict of interests?
  •  
    This is an article about the advancement of technology and how it has affected cryptography and secret-keeping during wartime.
1More

Protesters Are TArgets of Scrutiny Through Their Phones - 2 views

  •  
    An App circulAted Among the protesters in Hong Kong thAt supposedly wAs for coordinAting protest efforts, but wAs in reAlity A phishing AttAck thAt would trAck keystrokes, messAges, And identity informAtion of devices it wAs instAlled on. MAny signs point to the Chinese government As the origin of the mAlwAre, though. Not the first time A government hAs done something like plAnting spies And monitoring protestors. We sAw this in Little Brother too, with the DHS spies on the Xnet.
« First ‹ Previous 81 - 100 of 255 Next › Last »
Showing 20 items per page