Monthly Archives: August 2017

Mining Student Data Poses More Threats Than it Resolves

In the article “Mining Student Data Could Save Lives” Michael Morris makes an interesting point about data mining on college campuses. According to Morris, since college students are already using accounts and internet access provided by the school, there is no reason that colleges should not be able to monitor student data for early warning […] Continue reading

Posted in college student, data mining, security vs. privacy, Student Posts | Comments Off on Mining Student Data Poses More Threats Than it Resolves

A false sense of security

In Chapter 1 of Singh’s The Code Book, he states that “The cipher of Mary Queen of Scots clearly demonstrates that a weak cipher can be worse than no cipher at all”. Singh means that sometimes having a layer of security can be more detrimental than having none at all because it gives the sender […] Continue reading

Posted in cryptography, Mary Queen of Scots, Singh, Student Posts | Comments Off on A false sense of security

A False Sense of Security

In saying “The cipher of Mary Queen of Scots clearly demonstrates that a weak encryption can be worse than no encryption at all.”, I believe that Singh is implying that in using a cipher, Mary and her recipient felt much safer than if they had used no encryption at all. They believe their message is […] Continue reading

Posted in cryptography, false security, Mary Queen of Scots, Student Posts | Comments Off on A False Sense of Security

Bloody Ciphers

There is good merit in regards to reminding one’s self to the fact that they are never safe in comfort. Mary Queen of Scots and Anthony Babington communicated with this “comfort,” while a double agent, Gilbert Gifford, was secretly taking their encrypted messages to one of England’s leading cryptanalyst and cipher secretary, Thomas Phelippes. To […] Continue reading

Posted in Babington, Babington Plot, Mary Queen of Scots, Student Posts, Thomas Phelippes | Comments Off on Bloody Ciphers

A False Sense of Security Plus Treason Equals Death

In Singh’s The Code Book, the story of Mary Queen of Scots illustrates the dangers of having a false sense of security.  There are countless examples throughout history, but perhaps the most well-known example of a false sense of security is George Washington’s crossing of the Delaware to attack the British on that fabled December […] Continue reading

Posted in cryptography, Mary Queen of Scots, Singh, Student Posts, The Code Book | Comments Off on A False Sense of Security Plus Treason Equals Death

Finding the Balance of Confidence and Cryptography

The bigger they are, the harder they fall. In chapter one of The Code Bookby Simon Singh, Singh states that “…a weak encryption can be worse than no encryption at all” (Singh, 41). When it comes to cryptography, this could not be more true. A successfully encrypted message should only be decipherable to the intended […] Continue reading

Posted in Babington Plot, False Confidence, Philibert Babou, Student Posts | Comments Off on Finding the Balance of Confidence and Cryptography

You Don’t Need to Be Trained to Be Professional

With sophisticated and detailed research on statistics, al-Kindī invented his system of cryptanalysis, later known as the frequency analysis. It’s not surprised that he was considered as the greatest scientist in the ninth century when many disciplines including mathematics, statistics and linguistics that are well developed today were still in their rudimentary stages; thus his […] Continue reading

Posted in amateur cryptography, cryptanalysis, frequency analysis, Student Posts | Comments Off on You Don’t Need to Be Trained to Be Professional

…How Singh Makes Cryptography Interesting

Cryptography — we have seen it everywhere, from the movie screens to the morning news. In fact, so much so that you might even begin to get tired of hearing about it. You may just start to associate it with a couple of things that are easy to remember like The Imitation Games or the […] Continue reading

Posted in Student Posts | Comments Off on …How Singh Makes Cryptography Interesting

None>Something

[Response to question #1] When Singh says that “a weak encryption can be worse than no encryption at all,” it makes me want to equate it to a devastating mistake of leaving an unmistakable trace because with that, all of the evidence of enciphering a message to plot to kill Queen Elizabeth falls completely onto […] Continue reading

Posted in Babington, Blog Assignments, Queen Mary, Student Posts, weakness | Comments Off on None>Something

Modern Cryptanalysis Geniuses?

In The Code Book, by Simon Singh, the discovery of cryptanalysis is discussed. It is explained that without a strong background in core disciplines, cryptanalysis is impossible to achieve. Mathematics, statistics, and linguistics are vital in the development of many methods, such as frequency analysis. Earlier civilizations lacked a certain amount of efficiency in these fields, […] Continue reading

Posted in cryptanalysis, frequency analysis, Student Posts, substitution cipher | Comments Off on Modern Cryptanalysis Geniuses?