Monthly Archives: August 2018

Never Trust A Weak Encryption

In the first chapter of The Code Book by Simon Singh, he states that “a weak encryption is worse than no encryption at all”. A weak encryption is worse than no encryption at all because the sender and receiver of the message believe that the message is secure. A weak encryption leads to a false […] Continue reading

Posted in execution, false security, Mary Queen of Scots, Student Posts, weak encryption | Comments Off on Never Trust A Weak Encryption

Never Trust A Weak Encryption

In the first chapter of The Code Book by Simon Singh, he states that “a weak encryption is worse than no encryption at all”. A weak encryption is worse than no encryption at all because the sender and receiver of the message believe that the message is secure. A weak encryption leads to a false […] Continue reading

Posted in execution, false security, Mary Queen of Scots, Student Posts, weak encryption | Comments Off on Never Trust A Weak Encryption

Never Trust A Weak Encryption

In the first chapter of The Code Book by Simon Singh, he states that “a weak encryption is worse than no encryption at all”. A weak encryption is worse than no encryption at all because the sender and receiver of the message believe that the message is secure. A weak encryption leads to a false […] Continue reading

Posted in execution, false security, Mary Queen of Scots, Student Posts, weak encryption | Comments Off on Never Trust A Weak Encryption

How to Keep Communication Relatively Safe through Cryptography

“A weak encryption can be worse than no encryption” because it gives the communicators a false sense of security (41). As a result, they would fail to conceal their meaning in writing and use plain language. What’s communicated throughout the chapter is that one form of encryption is never enough. If one only employs the […] Continue reading

Posted in cryptanalysis, cryptography, Student Posts, weak encryption | Comments Off on How to Keep Communication Relatively Safe through Cryptography

Cryptography 1

        As the author of the code book, Simon Singh, writes, “Cryptanalysis could not be invented until a civilization had reached a sufficiently sophisticated level of scholarship in several disciplines, including mathematics, statistics, and linguistics.” People’s interest and skills toward all kinds of puzzles including cryptogram are getting developed fast in this […] Continue reading

Posted in amateur cryptography, internet, Singh, Student Posts | Comments Off on Cryptography 1

Message Strenght Beyond Decryption

In his idea that Mary Queen of Scots would have been better off without her relatively weak cipher,  Singh acknowledges the crucial relationship between the strength of a cipher and the level of accountable knowledge that encrypted messages contain. Mary Queen of Scots and Babington where often trading highly sensitive messages that outlined the plot […] Continue reading

Posted in code words, Mary Queen of Scots, sensive information, Student Posts | Comments Off on Message Strenght Beyond Decryption

Chapter 1 Assignment

In the chapter 1 of The Code Book, Singh wrote that “Cryptanalysis could not be invented until a civilization had reached a sufficiently sophisticated level of scholarship in several disciplines, including mathematics, statistics, and linguistics.” It is a reasonable comment for the reason as belows. First of all, only if a civilization has developed mathematical methods, […] Continue reading

Posted in amateur cryptography, Chapter 1, cryptanalysis, Student Posts | Comments Off on Chapter 1 Assignment

Cryptography in the Modern World: Keeping a Information Secret in the Age of Computing

In the first chapter, the examples of cryptography Singh selected were confined to the upper echelons of society: nobles, scholars, religious and military leaders. But perhaps more telling is the affluence of cryptanalysts such as Thomas Phelippes, a linguist fluent in five languages and an accomplished code-breaker; knowing five languages is a feat even in […] Continue reading

Posted in Computer Cryptography, education, Modern Cryptography, security, Student Posts | Comments Off on Cryptography in the Modern World: Keeping a Information Secret in the Age of Computing

Cryptography for different types of people

In the era of rapid technological advancement, the use of cryptography has become an important factor in protecting corporate employees and their customers’ personal information and privacy. Actually, not only the corporates use the cryptography, we can also see the cryptography appears in our daily life. In Chapter 1 of The Code Book, the author […] Continue reading

Posted in Ancient, China, Student Posts, Well-resourced people | Comments Off on Cryptography for different types of people

A Weak Cipher Turned Enemy’s Advantage

The quote “weak encryption can be worse than no encryption at all” describes the phenomenon in which sender of an encrypted message is more likely to state clearly and in detail his or her intentions than when writing a unencrypted message with full knowledge the enemy will be inspecting the text. When writing an unencrypted […] Continue reading

Posted in cipher, security, Student Posts, weak encryption | Comments Off on A Weak Cipher Turned Enemy’s Advantage