SAMPLE ALL THE FLAVORS!Increasingly, Vanderbilt instructors are incorporating blogs into their course design. Course Blogs at Vanderbilt is a mash-up of live feeds representing a wide variety of Vanderbilt courses that use blogging to help students reflect on, comment about, and introduce new ideas to course material. Click on the blog title to view the originating course blog. You can also click on the Participating Blogs tab for links to each blog.
ADD YOUR COURSE BLOG TO THIS SITE!Are you administering or participating in a course blog as at Vanderbilt? SEND US THE URL and we'll include it on this site.
Author Archives: tiburcma
In the chapter titled “Forays,” of Neal Stephenson’s Cryptonomicon, bit-key encryption is introduced as a method maintaining secrecy between the characters Randy and Avi. Unlike the other characters of the novel, Randy and Avi occupy the modern times and must … Continue reading → Continue reading
Cryptology, by definition, refers to the science and study of secure communications. Similarly, the intended purpose of cryptography is to hide information by way of code. So why is it that, to this day, a limit on the level of … Continue reading → Continue reading
In Little Brother, a novel written by Cory Doctorow, protagonist Marcus Yallow, a.k.a. “M1k3y,” battles against the prospect of universal surveillance by the very agency meant to protect him and his country. In his efforts to galvanize an army of young protesters against … Continue reading → Continue reading
Contradictory to the recurring theme of cryptography, it seems as though a certain cipher shall remain impervious to the demystifying test of time. After 100 years of collective effort from professional and amateur cryptanalysts alike, the enticing Beale cipher continues … Continue reading → Continue reading
For an impressive two-hundred years, the Great Cipher of Louis XIV thwarted several generations of accomplished cryptanalysts – a surprising feat, given that it did so through the manipulation of a substitution cipher. The cipher was created by the son-and-father … Continue reading → Continue reading
Today even amateurs, given time, are intuitively predisposed to recognize otherwise “logical” patterns strewn in ciphers and codes alike. This is due to the fact that analytic methods now utilized in the realm of cryptanalysis are not products of innate … Continue reading → Continue reading