Author Archives: shij5

The Security of Email and the Privacy

Now I just collect some information and have not started my paper yet, so I find that I will take a huge amount of effort to deal with this paper.  In this paper, I want to talk about the security of the emails during the international communications (like the legal access of the government, the […] Continue reading

Posted in internet, password, security, Student Posts | Comments Off on The Security of Email and the Privacy

Privacy is the fundamental right of human

I think the privacy of individual is one of the most important and the most basic right of human. Government can not and also does not have the right to invade the privacy of individual. Every one has his or … Continue reading Continue reading

Posted in National Security Agency, privacy, rights of citizens, Student Posts | Comments Off on Privacy is the fundamental right of human

The Wisdom from the Best

In the World War Two, the Allied cryptanalysts successfully broke German  Code and helped Allies win the war. One of the important facts I thought was the efforts from the genius. In Ultra, the Allies hired the best one in … Continue reading Continue reading

Posted in cryptography, enigma, Student Posts, World War II | Comments Off on The Wisdom from the Best

Security and Privacy

In the thirteenth chapter, the students talk about a question that “Under what circumstances should the federal government be prepared to suspend the Bill of Rights?” What they are talking exactly, in other words, is that should government suspend the … Continue reading Continue reading

Posted in Student Posts | Comments Off on Security and Privacy

The development of cipher

2.The Great Cipher used by Louis XIV remained unbroken for 200 years.  What were the factors that led to such a secure cipher? The Great Cipher was invited by the father-and-son team of Antonine and Bonavenure Rossignol. They had a … Continue reading Continue reading

Posted in Student Posts | Comments Off on The development of cipher

Clean your history in the computer

I want to response to the article “The 5 biggest online privacy threats of 2013” for this book assignment. This article talks about the information you left when you used the internet which might be collected by other people. This … Continue reading Continue reading

Posted in Student Posts | Comments Off on Clean your history in the computer

Blog Assignment 1

Q3:On page 15 of The Code Book, author Simon Singh writes, “Cryptanalysis could not be invented until a civilization had reached a sufficiently sophisticated level of scholarship in several disciplines, including mathematic… Continue reading

Posted in Student Posts | Comments Off on Blog Assignment 1