http://www.nsa.gov/kids/home.shtml
Our culture is obviously fascinated with secrecy and codes. Everyone wants to share secrets but now there are websites that encourage kids to create codes and try to break codes. Is this what we should really be teaching the children of the world? I have no clue because it could lead to having really talented code breakers later on or could just arm kids with tools to keep secrets more efficiently and better.
Thursday, September 29, 2011
The DaVinci Code
The novel The DaVinci Code is about the history of encryption. It is presented in a fun and entertaining way within the novel. The main character is a gifted cryptologist who decodes many of the clues within the novel. Dan Brown is brilliant in presenting very educating information on encryption while maintaining a fun and entertaining presentation. It would be a good novel for anyone but if you have a special interest in cryptology it would be a valuable and fun read.
Thursday, September 22, 2011
Cryptology affecting your subconscious
I wonder if there are hidden messages in advertisements or billboards. I believe that someone could have a message underlying in the background of a TV commercial. Can you hide messages like that and try to tap into people's subconscious and entice them into your product? I think you can. It might be deceiving but almost all advertisements are so why wouldn't companies pursue this option if it were possible. This idea has come from a film that I watched a long time ago and I thought it was pretty far fetched but since I am studying cryptology it seems more probable.
Social Secrecy
Secrecy gives people a connection and a bond in knowing something that is only shared between them. In this way cryptology affords everyone with a way to enhance the sharing of secrets without the fear of having them discovered. This is a very social form of cryptology. There is joy in creating a secret language and a code that only you and one other person know. The joy is found through creation of something and in having a special bond through whatever is being shared. Cryptology therefore is supremely social in the world of today. Girls still make code names for boys they like. People still write in a form of code through texts. The idea of keeping a secret is very appealing to a lot of people because you are revered if you can keep a secret and the only way to prove that is to have someone tell you one. Secrecy is social, and it keeps everyone thinking of how understand and describe the world in different ways in order to keep secrets.
Thursday, September 15, 2011
Everyday Encryption that Goes Undetected
Run through of an average day:
Watch the news on satellite TV
Unlock you're with a keyless lock numeric pad
Hook up you're iPod in your car
Pay for gas with a credit card
Go through a toll paid for with E-Z Pass
Get to work enter you're password in your computer
Use of all of these things is using encryption.
Encryption is used everyday and most of the population is oblivious to its presence. However, how would the signals be recognized from space without encryption and you create your own code when unlocking your car. Most of these products have encryption due to security matters but it is also how these devices are recognized to be yours and helps with identification and recognition of the product.
Watch the news on satellite TV
Unlock you're with a keyless lock numeric pad
Hook up you're iPod in your car
Pay for gas with a credit card
Go through a toll paid for with E-Z Pass
Get to work enter you're password in your computer
Use of all of these things is using encryption.
Encryption is used everyday and most of the population is oblivious to its presence. However, how would the signals be recognized from space without encryption and you create your own code when unlocking your car. Most of these products have encryption due to security matters but it is also how these devices are recognized to be yours and helps with identification and recognition of the product.
Security Encryption
Even though cryptology and encryption is mainly thought of to encode a secret message it is also used as a means of property security. This form of security is mainly used to protect against patented products so no one can copy the product and resell it for their own personal gain. Encryptions such as these are used on DVD's and computer software. There are layers of encryption on these products to protect the reproduction of the product. That is why you can't copy a Disney movie or your Microsoft word software and give it to your friend unless of course you are a very talented hacker, and decrypter.
Monday, September 5, 2011
The Alberti Cipher Disk ----- Try to decode My Cipher
Leon Battista Alberti was an Italian renaissance man who created the first polyalphabetic cipher. The device consists of two disks where only one rotates while the other remains static. Each disk contains an alphabet on the outer part of the ring. The outer disk is usually lined with a 20 letter alphabet along with the numbers 1-4 leaving out the letters J, H, K, W, Y, and U. Whereas the inner disk contains a randomized alphabet which leaves out the letters u, w, and j but includes the symbol &. In order to decode a message that has been enciphered with the Alberti method you must know the index letter. After that you look at the message and the first letter is the one that corresponds to the index letter. While decoding the message if a letter corresponds to a number 1-4 then you rotate the wheel so that, that letter now will correspond to the index letter. In rotating the disk multiple alphabets are utilized. Since Alberti thought the letters J, H, K, W, Y, and U superfluous it makes it difficult to encode modern messages so in order to use the code you substitute letters such as L for J and use common sense while deciphering the message. Try to decode the below text.
Index Letter: G
lcxgrgfolrbiimsccirilznt&txxoaodpodxrenaxavfagakkpgehxailaymhmffarangmbmnmgttyxxgkpvpzzy
Index Letter: G
lcxgrgfolrbiimsccirilznt&txxoaodpodxrenaxavfagakkpgehxailaymhmffarangmbmnmgttyxxgkpvpzzy
Sunday, September 4, 2011
From the Reading [The Code Book].... Beale
The indecipherable Beale Papers, one has been deciphered while the other two remain unsolved. I believe that the key text for the other two papers was created by Beale himself or was an original work that was never duplicated. Therefore it would be virtually impossible to break the cipher. However, shouldn't there be a way to crack the code? I think that eventually the elusive message within those two remaining papers will one day be revealed. Is any code truly impossible without the key?
Subscribe to:
Posts (Atom)