Skip to main content

Home/ Groups/ Math 1111: Cryptography
Malak Elmousallamy

Hacked Chamber of Commerce Opposed Cybersecurity Law - 0 views

  •  
    This is another example of the debate on whether security or privacy is more important.
Derek Bruff

How to Make a Book Disappear - Maria Konnikova - The Atlantic - 0 views

  •  
    Info on how Jonah Lehrer (the journalist who made up Bob Dylan quotes) had his book retracted.
Derek Bruff

Securing Medical Research: A Cybersecurity Point of View (Bruce Schneier) - 0 views

  •  
    "The problem of securing biological research data is a difficult and complicated one. Our ability to secure data on computers is not robust enough to ensure the security of existing data sets. Lessons from cryptography illustrate that neither secrecy measures, such as deleting technical details, nor national solutions, such as export controls, will work. "
Derek Bruff

Bletchley Park News - 0 views

  •  
    "Around sixty Bletchley Park veterans gathered again at the Home of the Codebreakers on Sunday 2nd September, for the annual Enigma Reunion. The event is timed each year to coincide with the anniversary of the arrival of the first codebreakers at Bletchley Park, after they received the coded message 'Auntie Flo is not so well', indicating they should report for top secret duties."
sareennl

Spartan Scytale - 1 views

  •  
    This website details how the Spartan scytale was used in 500 B.C. Also features a program that encodes your own message according to the spartan scytale.
Siegfried Schlunk

The Bible Codes - 0 views

  •  
    A brief look at the science of cryptology and the simple encryptions found in the Old Testament. Has a couple of examples and explains the three main transformations used.
Malak Elmousallamy

Cryptography and Modular Arithmetic - 0 views

  •  
    A useful document detailing the different substitution ciphers (including the Caesar Shift) and the application of Modular Arithmetic in modern day Cryptography.
Ryan McLaughlin

Nikon | The Story of Light and People | Unbreakable encryption with light-Quantum compu... - 0 views

  •  
    Very interesting article that begins with the story of Mary, Queen of Scots, and continues to speak about different techniques of encryption that are harder and harder to break. It also deals with the fact that Mary's messages were being intercepted and the article speaks about secure encryption using photons where you would know if your message was intercepted.
Hannah Lee

Computer Scientists Break Security Token Key in Record Time - NYTimes.com - 0 views

  •  
    A breach in supposedly secure keys given to employees by private companies vindicates previous warnings by cryptographers that companies should use more difficult keys, and that companies have not been cautious enough using such keys because of their assumed security.
Marco Tiburcio

Two Centuries On, a Cryptologist Cracks a Presidential Code - 0 views

  •  
    An interesting account of how technology can now help "crack" codes which were once thought to be impervious.
Justin Yeh

Caesar Shift Cipher - 0 views

  •  
    An in-depth description of Julius Caesar's shift cipher and how it works. Also shows how to use frequency analysis and chi-square values to quickly break the cipher.
Annie Vreeland

Mary, Queen of Scots (1542-1587) - 0 views

  •  
    An in depth summary about Mary, Queen of Scots, and the people she encountered.
Kristin Davis

Cipher Mysteries - 0 views

  •  
    This website has lots of great information on historical ciphers such as the Voynich Cipher and the Dorabella Cipher.
Emily Dinino

For Whose Eyes Only? - 0 views

  •  
    Cryptanalysis and Frequency Analysis
michaelpollack

Mary Queen of Scots - 0 views

  •  
    A brief history on Mary, Queen of Scots, and her secret plotting against Queen Elizabeth.
Alberto Perez

The National Archives | Research, education & online exhibitions | Exhibitions | Secret... - 0 views

  •  
    The Babington plot, which was the undoing of Mary, Queen of Scots, was one of several conspiracies against Elizabeth I that were uncovered. The Ridolfi Plot In 1571 a plot was discovered involving Philip II of Spain, Pope Pius V and the Duke of Norfolk, as well as Mary's advisor, the Bishop of Ross, and Mary herself.
Collin Jackson

Steganography and Cryptography Using DNA - 0 views

  •  
    Researchers have applied the microdot principle described by Singh on page 6 to hide messages in DNA sequences.
Tyren Herbst-Ingram

Mafia boss undone by clumsy Caesar cipher - 0 views

  •  
    Clues left in the clumsily encrypted notes of a Mafia don have helped Italian investigators to track his associates and ultimately contributed to his capture after years on the run. The recently busted Bernardo Provenzano, reputed to be the "boss of bosses" of the Sicilian Mafia, used a modified form of the Caesar cipher to obscure "sensitive information" in notes left to either his family or underlings.
« First ‹ Previous 761 - 780 of 793 Next ›
Showing 20 items per page