Skip to main content

Home/ Groups/ Math 1111: Cryptography
Derek Bruff

This guy suffered an epic hack. - 1 views

  •  
    Wow, poor guy. Time to update my passwords.
sareennl

Spartan Scytale - 1 views

  •  
    This website details how the Spartan scytale was used in 500 B.C. Also features a program that encodes your own message according to the spartan scytale.
Derek Bruff

How to Make a Book Disappear - Maria Konnikova - The Atlantic - 0 views

  •  
    Info on how Jonah Lehrer (the journalist who made up Bob Dylan quotes) had his book retracted.
Derek Bruff

Securing Medical Research: A Cybersecurity Point of View (Bruce Schneier) - 0 views

  •  
    "The problem of securing biological research data is a difficult and complicated one. Our ability to secure data on computers is not robust enough to ensure the security of existing data sets. Lessons from cryptography illustrate that neither secrecy measures, such as deleting technical details, nor national solutions, such as export controls, will work. "
Derek Bruff

Bletchley Park News - 0 views

  •  
    "Around sixty Bletchley Park veterans gathered again at the Home of the Codebreakers on Sunday 2nd September, for the annual Enigma Reunion. The event is timed each year to coincide with the anniversary of the arrival of the first codebreakers at Bletchley Park, after they received the coded message 'Auntie Flo is not so well', indicating they should report for top secret duties."
Siegfried Schlunk

The Bible Codes - 0 views

  •  
    A brief look at the science of cryptology and the simple encryptions found in the Old Testament. Has a couple of examples and explains the three main transformations used.
Malak Elmousallamy

Cryptography and Modular Arithmetic - 0 views

  •  
    A useful document detailing the different substitution ciphers (including the Caesar Shift) and the application of Modular Arithmetic in modern day Cryptography.
Ryan McLaughlin

Nikon | The Story of Light and People | Unbreakable encryption with light-Quantum compu... - 0 views

  •  
    Very interesting article that begins with the story of Mary, Queen of Scots, and continues to speak about different techniques of encryption that are harder and harder to break. It also deals with the fact that Mary's messages were being intercepted and the article speaks about secure encryption using photons where you would know if your message was intercepted.
Hannah Lee

Computer Scientists Break Security Token Key in Record Time - NYTimes.com - 0 views

  •  
    A breach in supposedly secure keys given to employees by private companies vindicates previous warnings by cryptographers that companies should use more difficult keys, and that companies have not been cautious enough using such keys because of their assumed security.
Marco Tiburcio

Two Centuries On, a Cryptologist Cracks a Presidential Code - 0 views

  •  
    An interesting account of how technology can now help "crack" codes which were once thought to be impervious.
Malak Elmousallamy

Hacked Chamber of Commerce Opposed Cybersecurity Law - 0 views

  •  
    This is another example of the debate on whether security or privacy is more important.
Annie Vreeland

How 18th-Century Copiale Cipher Was Cracked - 0 views

  •  
    A description of how the Copiale Cipher was cracked. 
Collin Jackson

Cipher Solver - 0 views

  •  
    Here is the tool I used that puts the plain text letters over the cipher letters.
sareennl

Tools boast easy cracking of Microsoft crypto for businesses - 0 views

  •  
    Summary: Cryptography specialists have developed tools to crack PPTP encryption (based on an algorithm from Microsoft), gaining access to Wi-Fi, passwords, corporate networks and data.
Marco Tiburcio

Step 1: Post Elusive Proof. Step 2: Watch Fireworks. - 0 views

  •  
    Online collaboration over the claimed proof "P versus NP" demonstrates the potential of the internet in the field of mathematical and intellectual research alike. The proof "P versus NP," if verified, would make obsolete modern cryptography, which works under the assumption that P does not equal NP.
Hannah Lee

Eastern European Cybercriminals Said to Trump Asian Counterparts in Sophistication CIO.com - 0 views

  •  
    Eastern European hackers have been proven more effective at their craft than Asian cybercriminals due to their precision, focus, and ability to protect their identities. 
Emily Dinino

New security flaws detected in mobile devices - USATODAY.com - 0 views

  •  
    Mobile devices offer incredibly low security or protection from criminals trying to decipher data. 
Siegfried Schlunk

Quantum processor's prime feat raises security issues | ZDNet - 0 views

  •  
    Summary: California researchers report a breakthrough with the creation of a solid-state quantum processor that could ultimately have a bearing on future cryptographic techniques. Researchers in California have designed and built a quantum processor capable of factoring 15 into its primes - with major implications for computer security.
Kristin Davis

UK recruits code-breakers with online puzzle - CNN - 0 views

  •  
    The Government Communications Headquarters in the UK offered a job application to anyone who could solve their code found at www.canyoucrackit.co.uk
Collin Jackson

The Fastest-Ever Random Number Generator Conjures Digits from Subatomic Noise in a Vacuum - 0 views

  •  
    Not directly involving cryptography, but the implications of this definitely affect the field. Now that we have the capability to generate truly random number strings, our ability to encrypt data will improve.
1 - 20 Next › Last »
Showing 20 items per page