Thursday, November 10, 2011
Zodiac Killer
The Zodiac Killer code was never truly broken. I mean parts of it were but some parts still remain unciphered and their meaning is still hidden. I wonder if he was the only one to know how to read the cipher? I am also curious if the parts of the code that remain unchiphered actually make sense or if they are just gibberish. I find this particular topic fascinating and chilling simultaneously.
Atbash Cipher and Baphomet
Baphomet was supposedly a pagan deity worshipped by the Knights Templar. However, Dr. Schonfield an expert on the Atbash Cipher thought the name Baphomet had a hidden meaning. He decided to decipher the name using the Atbash Cipher and found that when this was done the name became Sophia. Which means either wisdom or a goddess. Therefore, according to Schonfield's theory the Knights Templar were not worshipping a pagan deity but either Mary Magdalan (goddess) or had an extremely high respect for wisdom, meaning they were wrongly convicted for heresy.
Thursday, November 3, 2011
Education for a Cryptologist
Undergrad Degree in: Mathematics and Computer Science
Post Grad: Research Degree
Linguistics: Knowledgeable in more than one language preferably more
Drive: Well informed/Different Perspective/Creative
Research & Development: Need to be able to see different codes and come up with more difficult and challenging ones for protection
These are just some of the things that are required to become a cryptologist. Also there is probably some element of talent that is necessary to be especially successful in this field. Sounds difficult and not fun to me.
Post Grad: Research Degree
Linguistics: Knowledgeable in more than one language preferably more
Drive: Well informed/Different Perspective/Creative
Research & Development: Need to be able to see different codes and come up with more difficult and challenging ones for protection
These are just some of the things that are required to become a cryptologist. Also there is probably some element of talent that is necessary to be especially successful in this field. Sounds difficult and not fun to me.
Atbash Cipher
The Atbash cipher is a simple substitution cipher. It replaces the first letter "a" with the last "z" and the second letter "b" with the second to last letter "y" and so on. It was used in ancient times and was traditionally known as a Holy Code based on Hebrew.
It is rumored to have been used by the Knights Templar to name their deity.
It is rumored to have been used by the Knights Templar to name their deity.
Thursday, October 27, 2011
Cryptograms
Cryptograms harness analytical thinking skills and concentration skills. Solving these types of puzzles improves brain activity and strengthens the brain as a muscle. So go have fun and improve your brain function..... http://www.memory-improvement-tips.com/free-cryptogram-puzzles.html
CryptoCellar
I found this really cool site that has a ton of information on cryptology. It goes from historic cryptology to modern day cryptology as well as places it is seen in such as: films and novels. This might help some of you with the research for the project.
http://cryptocellar.org/
http://cryptocellar.org/
Thursday, October 20, 2011
Video Game Codes
Has anyone ever played video games? Probably everyone, but has anyone ever used a cheat code to advance within the game. They can be simple codes that you enter on the controller to help reset quickly such as reloading ammunition. These codes trigger an event or affect within the video game. On top of these simple codes there are also devices that can be hooked up to a gaming console that help gamers enter helpful cheat codes. Gamers use cheat codes regularly so is it really cheating if everyone knows about it?
Cryptologic Linguist
In the army there is a position called a cryptologic linguist. This person is responsible for performing and supervising secret foreign communications with their own knowledge and the use of signals equipment. Some of the duties are:
-identifying foreign communications within a specified geographic area and the categorization of these communications
-analysis of foreign communication looking for information that supports mission requirements
-recognition of changes in communication modes and letting a superior know
-translation duties
-operate communications systems
-provide significant translations or transcriptions of foreign communications
Therefore this person is employed with the expertise of another language and the talent to recognize cryptologic tendencies in foreign communications.
Thursday, October 13, 2011
Girls and Code Names
Girls around the middle school age often times use codes with their girlfriends to discuss boys. They come up with secret code names to call boys they like in order to speak openly about their crushes. This is an example of how cryptology/codes are used within our culture. I wonder if boys use code names for girls they like? I wouldn't know since I am a girl, but my gut says no.
Kids and Cryptology
Often times children come up with their own words and different variations of what they are taught. Some even create their own languages and sometimes secret codes. I know this is really prevalent in twins who are very close, they come up with their own form of communication. However, it is a form of cryptology in the fact that it secret to all those who did not create it, i.e. adults. These languages and codes hardly ever stand the test of time though.
Thursday, October 6, 2011
National Cryptologic Museum
The National Cryptologic Museum is presented to the public by the National Security Agency. It shows the nations cryptologic legacy and place in world history. It is adjacent to NSA headquarters in Maryland. The museum has a collection of thousands of artifacts that collectively serve to maintain knowledge of cryptographers and cryptanalysts. It is the only museum within the intelligence community.
Cryptanalysts
Cryptanalysts decode and evaluate secret messages for police agencies, government agencies, and armed forces. They also protect organizations and individuals from hackers and viruses. They also specialize in protection of online banking. They must understand how to decipher codes and write codes that could be broken. Most cryptanalysts are mathematical geniuses since most encryption codes rely on computational number theories and number schemes.
Thursday, September 29, 2011
CryptoKids
http://www.nsa.gov/kids/home.shtml
Our culture is obviously fascinated with secrecy and codes. Everyone wants to share secrets but now there are websites that encourage kids to create codes and try to break codes. Is this what we should really be teaching the children of the world? I have no clue because it could lead to having really talented code breakers later on or could just arm kids with tools to keep secrets more efficiently and better.
Our culture is obviously fascinated with secrecy and codes. Everyone wants to share secrets but now there are websites that encourage kids to create codes and try to break codes. Is this what we should really be teaching the children of the world? I have no clue because it could lead to having really talented code breakers later on or could just arm kids with tools to keep secrets more efficiently and better.
The DaVinci Code
The novel The DaVinci Code is about the history of encryption. It is presented in a fun and entertaining way within the novel. The main character is a gifted cryptologist who decodes many of the clues within the novel. Dan Brown is brilliant in presenting very educating information on encryption while maintaining a fun and entertaining presentation. It would be a good novel for anyone but if you have a special interest in cryptology it would be a valuable and fun read.
Thursday, September 22, 2011
Cryptology affecting your subconscious
I wonder if there are hidden messages in advertisements or billboards. I believe that someone could have a message underlying in the background of a TV commercial. Can you hide messages like that and try to tap into people's subconscious and entice them into your product? I think you can. It might be deceiving but almost all advertisements are so why wouldn't companies pursue this option if it were possible. This idea has come from a film that I watched a long time ago and I thought it was pretty far fetched but since I am studying cryptology it seems more probable.
Social Secrecy
Secrecy gives people a connection and a bond in knowing something that is only shared between them. In this way cryptology affords everyone with a way to enhance the sharing of secrets without the fear of having them discovered. This is a very social form of cryptology. There is joy in creating a secret language and a code that only you and one other person know. The joy is found through creation of something and in having a special bond through whatever is being shared. Cryptology therefore is supremely social in the world of today. Girls still make code names for boys they like. People still write in a form of code through texts. The idea of keeping a secret is very appealing to a lot of people because you are revered if you can keep a secret and the only way to prove that is to have someone tell you one. Secrecy is social, and it keeps everyone thinking of how understand and describe the world in different ways in order to keep secrets.
Thursday, September 15, 2011
Everyday Encryption that Goes Undetected
Run through of an average day:
Watch the news on satellite TV
Unlock you're with a keyless lock numeric pad
Hook up you're iPod in your car
Pay for gas with a credit card
Go through a toll paid for with E-Z Pass
Get to work enter you're password in your computer
Use of all of these things is using encryption.
Encryption is used everyday and most of the population is oblivious to its presence. However, how would the signals be recognized from space without encryption and you create your own code when unlocking your car. Most of these products have encryption due to security matters but it is also how these devices are recognized to be yours and helps with identification and recognition of the product.
Watch the news on satellite TV
Unlock you're with a keyless lock numeric pad
Hook up you're iPod in your car
Pay for gas with a credit card
Go through a toll paid for with E-Z Pass
Get to work enter you're password in your computer
Use of all of these things is using encryption.
Encryption is used everyday and most of the population is oblivious to its presence. However, how would the signals be recognized from space without encryption and you create your own code when unlocking your car. Most of these products have encryption due to security matters but it is also how these devices are recognized to be yours and helps with identification and recognition of the product.
Security Encryption
Even though cryptology and encryption is mainly thought of to encode a secret message it is also used as a means of property security. This form of security is mainly used to protect against patented products so no one can copy the product and resell it for their own personal gain. Encryptions such as these are used on DVD's and computer software. There are layers of encryption on these products to protect the reproduction of the product. That is why you can't copy a Disney movie or your Microsoft word software and give it to your friend unless of course you are a very talented hacker, and decrypter.
Monday, September 5, 2011
The Alberti Cipher Disk ----- Try to decode My Cipher
Leon Battista Alberti was an Italian renaissance man who created the first polyalphabetic cipher. The device consists of two disks where only one rotates while the other remains static. Each disk contains an alphabet on the outer part of the ring. The outer disk is usually lined with a 20 letter alphabet along with the numbers 1-4 leaving out the letters J, H, K, W, Y, and U. Whereas the inner disk contains a randomized alphabet which leaves out the letters u, w, and j but includes the symbol &. In order to decode a message that has been enciphered with the Alberti method you must know the index letter. After that you look at the message and the first letter is the one that corresponds to the index letter. While decoding the message if a letter corresponds to a number 1-4 then you rotate the wheel so that, that letter now will correspond to the index letter. In rotating the disk multiple alphabets are utilized. Since Alberti thought the letters J, H, K, W, Y, and U superfluous it makes it difficult to encode modern messages so in order to use the code you substitute letters such as L for J and use common sense while deciphering the message. Try to decode the below text.
Index Letter: G
lcxgrgfolrbiimsccirilznt&txxoaodpodxrenaxavfagakkpgehxailaymhmffarangmbmnmgttyxxgkpvpzzy
Index Letter: G
lcxgrgfolrbiimsccirilznt&txxoaodpodxrenaxavfagakkpgehxailaymhmffarangmbmnmgttyxxgkpvpzzy
Sunday, September 4, 2011
From the Reading [The Code Book].... Beale
The indecipherable Beale Papers, one has been deciphered while the other two remain unsolved. I believe that the key text for the other two papers was created by Beale himself or was an original work that was never duplicated. Therefore it would be virtually impossible to break the cipher. However, shouldn't there be a way to crack the code? I think that eventually the elusive message within those two remaining papers will one day be revealed. Is any code truly impossible without the key?
Subscribe to:
Posts (Atom)