Skip to main content

Home/ Groups/ Math 1111: Cryptography
1More

This guy suffered an epic hack. - 1 views

  •  
    Wow, poor guy. Time to update my passwords.
1More

Spartan Scytale - 1 views

  •  
    This website details how the Spartan scytale was used in 500 B.C. Also features a program that encodes your own message according to the spartan scytale.
1More

How to Make a Book Disappear - Maria Konnikova - The Atlantic - 0 views

  •  
    Info on how Jonah Lehrer (the journalist who made up Bob Dylan quotes) had his book retracted.
1More

Securing Medical Research: A Cybersecurity Point of View (Bruce Schneier) - 0 views

  •  
    "The problem of securing biological research data is a difficult and complicated one. Our ability to secure data on computers is not robust enough to ensure the security of existing data sets. Lessons from cryptography illustrate that neither secrecy measures, such as deleting technical details, nor national solutions, such as export controls, will work. "
1More

Bletchley Park News - 0 views

  •  
    "Around sixty Bletchley Park veterans gathered again at the Home of the Codebreakers on Sunday 2nd September, for the annual Enigma Reunion. The event is timed each year to coincide with the anniversary of the arrival of the first codebreakers at Bletchley Park, after they received the coded message 'Auntie Flo is not so well', indicating they should report for top secret duties."
1More

Cipher Solver - 0 views

  •  
    Here is the tool I used that puts the plain text letters over the cipher letters.
1More

Cryptography and Modular Arithmetic - 0 views

  •  
    A useful document detailing the different substitution ciphers (including the Caesar Shift) and the application of Modular Arithmetic in modern day Cryptography.
1More

Nikon | The Story of Light and People | Unbreakable encryption with light-Quantum compu... - 0 views

  •  
    Very interesting article that begins with the story of Mary, Queen of Scots, and continues to speak about different techniques of encryption that are harder and harder to break. It also deals with the fact that Mary's messages were being intercepted and the article speaks about secure encryption using photons where you would know if your message was intercepted.
1More

Computer Scientists Break Security Token Key in Record Time - NYTimes.com - 0 views

  •  
    A breach in supposedly secure keys given to employees by private companies vindicates previous warnings by cryptographers that companies should use more difficult keys, and that companies have not been cautious enough using such keys because of their assumed security.
1More

Two Centuries On, a Cryptologist Cracks a Presidential Code - 0 views

  •  
    An interesting account of how technology can now help "crack" codes which were once thought to be impervious.
1More

Hacked Chamber of Commerce Opposed Cybersecurity Law - 0 views

  •  
    This is another example of the debate on whether security or privacy is more important.
1More

How 18th-Century Copiale Cipher Was Cracked - 0 views

  •  
    A description of how the Copiale Cipher was cracked. 
1More

Britain's GCHQ Uses Online Puzzle to Recruit Hackers - NYTimes.com - 0 views

  •  
    Instead of hiring "upper-class twits from Oxford and Cambridge," A government communications agency tried a new angle on recruiting hackers. They decided to combat hackers with other experienced hackers by posting an online puzzle and offering a job interview to those who solved it.
1More

Tools boast easy cracking of Microsoft crypto for businesses - 0 views

  •  
    Summary: Cryptography specialists have developed tools to crack PPTP encryption (based on an algorithm from Microsoft), gaining access to Wi-Fi, passwords, corporate networks and data.
1More

Step 1: Post Elusive Proof. Step 2: Watch Fireworks. - 0 views

  •  
    Online collaboration over the claimed proof "P versus NP" demonstrates the potential of the internet in the field of mathematical and intellectual research alike. The proof "P versus NP," if verified, would make obsolete modern cryptography, which works under the assumption that P does not equal NP.
1More

Eastern European Cybercriminals Said to Trump Asian Counterparts in Sophistication CIO.com - 0 views

  •  
    Eastern European hackers have been proven more effective at their craft than Asian cybercriminals due to their precision, focus, and ability to protect their identities. 
1More

New security flaws detected in mobile devices - USATODAY.com - 0 views

  •  
    Mobile devices offer incredibly low security or protection from criminals trying to decipher data. 
1More

Quantum processor's prime feat raises security issues | ZDNet - 0 views

  •  
    Summary: California researchers report a breakthrough with the creation of a solid-state quantum processor that could ultimately have a bearing on future cryptographic techniques. Researchers in California have designed and built a quantum processor capable of factoring 15 into its primes - with major implications for computer security.
1More

UK recruits code-breakers with online puzzle - CNN - 0 views

  •  
    The Government Communications Headquarters in the UK offered a job application to anyone who could solve their code found at www.canyoucrackit.co.uk
1More

The Fastest-Ever Random Number Generator Conjures Digits from Subatomic Noise in a Vacuum - 0 views

  •  
    Not directly involving cryptography, but the implications of this definitely affect the field. Now that we have the capability to generate truly random number strings, our ability to encrypt data will improve.
1 - 20 Next › Last »
Showing 20 items per page