Author Archives: jackso92

Blindly Building

The most interesting passage from Cryptonomicon that relates to a discussion earlier in the course is found on page 89. Here, Lawrence describes the most intriguing machine found at Station Hypo: at machine built by Commander Schoen and designed to … Continue reading Continue reading

Posted in Cryptonomicon, machine, Student Posts, technology | Comments Off on Blindly Building

The Availability of Ingenuity

I’m a staunch supporter of sharing information. In fact, I believe that patents should have a quicker expiration date (especially in fields where innovation moves very rapidly). Consider this: a patent filed in 1993 for a particular style of trackball … Continue reading Continue reading

Posted in NSA, privacy, security, Student Posts, technology | Comments Off on The Availability of Ingenuity

Privacy for the Sake of Privacy

The passage in the book that I found most interesting comes from Chapter 4. Marcus discusses what it feels like to be locked up with all his privacy revoked. I often wondered why it matters so much that we keep … Continue reading Continue reading

Posted in little brother, privacy, Student Posts, technology | Comments Off on Privacy for the Sake of Privacy

The Beale Ciphers Continue to "Puzzle" Cryptanalysts

The Beale Ciphers remain tantalizing to this day for two main reasons.¬†First, the magnitude of the reward is impressive. $20 million is a lot more money than the average American will see in his or her lifetime. Coming into such … Continue reading Continue reading

Posted in Beale Cipher, Mystery, Reward, Student Posts | Comments Off on The Beale Ciphers Continue to "Puzzle" Cryptanalysts

The Great Headache

The Great Cipher used by King Louis XIV was an extremely strong cipher for several reasons. First, the cipher text included 587 different numbers. This magnitude of possible decipherments was the first line of defense. Additionally, because multiple cipher types … Continue reading Continue reading

Posted in Louis XIV, Student Posts, The Code Book, The Great Cipher | Comments Off on The Great Headache

Cryptography and the Availability of Information

I think that amateur cryptanalysts using methods that were impossible for some early civilizations to use demonstrates the accessibility and ubiquity of information today. For example, some puzzles are centered around ciphers and decryption. These puzzles attract the attention of … Continue reading Continue reading

Posted in cryptanalysis, knowledge, Student Posts, technology | Comments Off on Cryptography and the Availability of Information