SAMPLE ALL THE FLAVORS!Increasingly, Vanderbilt instructors are incorporating blogs into their course design. Course Blogs at Vanderbilt is a mash-up of live feeds representing a wide variety of Vanderbilt courses that use blogging to help students reflect on, comment about, and introduce new ideas to course material. Click on the blog title to view the originating course blog. You can also click on the Participating Blogs tab for links to each blog.
ADD YOUR COURSE BLOG TO THIS SITE!Are you administering or participating in a course blog as at Vanderbilt? SEND US THE URL and we'll include it on this site.
Author Archives: sareennl
Cryptonomicon by Neal Stephenson is an interesting and informative novel tying together different generations of cryptography. A passage I found most interesting was in the chapter ‘Cycles’. In this chapter, Stephenson expands on the fundamental mathematics behind the Enigma machine: … Continue reading → Continue reading
When the Data Encryption Standard (DES) was created, the National Security Agency made sure that it was weak enough that they could break it. The Data Encryption Standard was a result of Horst Feistel’s product, Lucifer. Lucifer was a machine … Continue reading → Continue reading
Cary Doctorow’s Little Brother tells the story of Marcus Yallow, a high school student who rebels against the Department ofHomeland Security for violating his rights to privacy. Marcus goes to the extent of creating a new secure Internet, hacking transportation … Continue reading → Continue reading
The Beale Ciphers have challenged thousands of cryptanalysts for the past hundred years. The Beale Ciphers consist of three ciphers and are seemingly unbreakable. While most professionals would give up after several unsuccessful attempts, people still continue to try and … Continue reading → Continue reading
As cryptographers attempted to improve the security of ciphers, while maintaining their practicality, more complex ciphers were being created. The monoalphabetic substitution cipher was becoming less secure, leading to the advent of the polyalphabetic cipher and the homophonic cipher. Yet, … Continue reading → Continue reading
In Simon Singh’s The Code Book, he states “Cryptanalysis could not be invented until a civilization has reached a sufficiently sophisticated level of scholarship.” If such a sophisticated level of scholarship was needed to invent cryptanalysis, and cryptanalysts were considered … Continue reading → Continue reading