SAMPLE ALL THE FLAVORS!Increasingly, Vanderbilt instructors are incorporating blogs into their course design. Course Blogs at Vanderbilt is a mash-up of live feeds representing a wide variety of Vanderbilt courses that use blogging to help students reflect on, comment about, and introduce new ideas to course material. Click on the blog title to view the originating course blog. You can also click on the Participating Blogs tab for links to each blog.
ADD YOUR COURSE BLOG TO THIS SITE!Are you administering or participating in a course blog as at Vanderbilt? SEND US THE URL and we'll include it on this site.
Author Archives: pollacmr
The part of Cryptonomicon that caught my attention was Lawrence Waterhouse’s attempt to solve the cipher, or “mathematical exercise” given to him and others by Commander Schoen. Schoen writes out the cipher, a list of 5 groups each with 5 … Continue reading → Continue reading
Although it is fair to say that businesses were forced to rely on security that was less than optimal, the security they were using was more than sufficient. The Data Encryption Standard (DES) has a maximum amount of keys of … Continue reading → Continue reading
In chapter 5, Marcus is released from prison and he returns to his home. He starts up his self-constructed laptop and realizes that something is wrong with it after the power cord refuses to stay connected. He now realizes that … Continue reading → Continue reading
The Great Cipher, used by Louis XIV, was far more complex than any cipher used in the 17th century. It was not simply a substitution cipher nor a homophone cipher. Étienne Bazeries considered that the Great Cipher could be a … Continue reading → Continue reading
It is not surprising to me that amateur cryptanalysts today often use an approach like frequency analysis to solve substitution ciphers without any prior training, while Singh states that a certain level of ‘scholarship’ was required for such a skill. … Continue reading → Continue reading