Author Archives: pollacmr

Intuition

The part of Cryptonomicon that caught my attention was Lawrence Waterhouse’s attempt to solve the cipher, or “mathematical exercise” given to him and others by Commander Schoen. Schoen writes out the cipher, a list of 5 groups each with 5 … Continue reading Continue reading

Posted in Cryptonomicon, frequency analysis, Lawrence Waterhouse, Student Posts | Comments Off on Intuition

Sufficiently Safe

Although it is fair to say that businesses were forced to rely on security that was less than optimal, the security they were using was more than sufficient. The Data Encryption Standard (DES) has a maximum amount of keys of … Continue reading Continue reading

Posted in DES, National Security, NSA, Singh, Student Posts | Comments Off on Sufficiently Safe

Severity Overlooked

In chapter 5, Marcus is released from prison and he returns to his home. He starts up his self-constructed laptop and realizes that something is wrong with it after the power cord refuses to stay connected. He now realizes that … Continue reading Continue reading

Posted in bug, little brother, marcus, privacy, Student Posts | Comments Off on Severity Overlooked

√Čtienne Bazeries: Ahead of His Time

The Great Cipher, used by Louis XIV, was far more complex than any cipher used in the 17th century. It was not simply a substitution cipher nor a homophone cipher. √Čtienne Bazeries considered that the Great Cipher could be a … Continue reading Continue reading

Posted in bazeries, digraph, Singh, Student Posts, syllables, The Great Cipher | Comments Off on √Čtienne Bazeries: Ahead of His Time

Relative Scholarship

It is not surprising to me that amateur cryptanalysts today often use an approach like frequency analysis to solve substitution ciphers without any prior training, while Singh states that a certain level of ‘scholarship’ was required for such a skill. … Continue reading Continue reading

Posted in cryptography, scholarship, Singh, Student Posts, technology | Comments Off on Relative Scholarship