Author Archives: stubblj

The Process of Writing

Writing my practical cryptography paper requires a lot of time and effort. Firstly and most importantly, I have found all of the sources I need in writing this paper. This took a great amount of time to find the perfect articles on the internet to address my topic, phishing. After finding and printing out all […] Continue reading

Posted in Blog Assignments, FYWS, Phishing, Practical Cryptography, Student Posts | Comments Off on The Process of Writing

Privacy Rules

The government should not be given free reign to use electronic surveillance for “national security” when compromising the privacy of citizens. I understand that the government would compromise privacy in the best interests of the state; however, the efficiency of … Continue reading Continue reading

Posted in Blog Assignments, PGP, privacy, Student Posts, Zimmermann | Comments Off on Privacy Rules

Fatal Flaws

Photo Credit: david.nikonvscanon via Compfight cc   Although the Enigma machine at first seemed nearly impossible to decode, eventually the Allies successfully were able to get breakthroughs in the machine and finally solve the Enigma machine. A major reason for … Continue reading Continue reading

Posted in Allies, enigma, Student Posts, WWII | Comments Off on Fatal Flaws

Privacy: From Times Square to the Percent Accuracy

The overwhelming theme of the novel Little Brother concerns the privacy of an individual and a society in all aspects of life. From the moment in which Marcus is first questioned by the National Homeland Security (NHS) until the end … Continue reading Continue reading

Posted in FYWS, little brother, marcus yallow, NHS, privacy, Student Posts | Comments Off on Privacy: From Times Square to the Percent Accuracy

The Vigenère Cipher

For some time before the development of the Vigenère cipher, “anybody sending an encrypted message had to accept that an expert enemy codebreaker might intercept and decipher their most precious secrets.” (Singh, p. 45) How is this environment different from … Continue reading Continue reading

Posted in FYWS, Student Posts, The Code Book | Comments Off on The Vigenère Cipher