Skip to main content

Home/ Math 1111: Cryptography/ Group items matching "defense" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
andrewhaygood97

Military encryption's going open -- Defense Systems - 2 views

  •  
    This makes me wonder how ethical it is for the NSA to be so heavily involved in cryptography internationally. Are they building a backdoor into these crytographic systems? If so, how ethical could that be?
saraatsai

Crypto modernization transforms military communications - 1 views

  •  
    Embeddable cryptographic processors are enabling a host of new defense communications applications, such as smartphones and tablet computers for tactical use on the front lines, but should soldiers be using the same object for both secure and insecure communications? Or does this create a conflict of interests?
  •  
    This is an article about the advancement of technology and how it has affected cryptography and secret-keeping during wartime.
giordas

BA jihadist relied on Jesus-era encryption - 0 views

  •  
    Interesting article that shows how even though we think we're very advanced at cryptography, sometimes an old and outdated technique slips through the cracks in our defenses.
andrewhaygood97

Google Is Powering A New Search Engine That Digs Internet's Dirty Secrets - 1 views

  •  
    I think it's pretty interesting that one of the world's largest internet corporations is going to find the security vulnerabilities of our modems and routers. Will they just be helping us fix them, or using the errors for their own gain?
  •  
    I think it's pretty interesting that one of the world's largest internet corporations is going to find the security vulnerabilities of our modems and routers. Will they just be helping us fix them, or using the errors for their own gain?
1 - 5 of 5
Showing 20 items per page