Author Archives: tiburcma

Computer Cryptography

In the chapter titled “Forays,” of Neal Stephenson’s Cryptonomicon, bit-key encryption is introduced as a method maintaining secrecy between the characters Randy and Avi. Unlike the other characters of the novel, Randy and Avi occupy the modern times and must … Continue reading Continue reading

Posted in Computer Cryptography, Cryptonomicon, Student Posts | Comments Off on Computer Cryptography

Standardizing Security

Cryptology, by definition, refers to the science and study of secure communications. Similarly, the intended purpose of cryptography is to hide information by way of code. So why is it that, to this day, a limit on the level of … Continue reading Continue reading

Posted in Data Encryption Standard, Lucifer System, National Security Agency, Student Posts | Comments Off on Standardizing Security

The Priority of Privacy

In Little Brother, a novel written by Cory Doctorow, protagonist Marcus Yallow, a.k.a. “M1k3y,” battles against the prospect of universal surveillance by the very agency meant to protect him and his country. In his efforts to galvanize an army of young protesters against … Continue reading Continue reading

Posted in Constitution, little brother, privacy, Rights, Student Posts | Comments Off on The Priority of Privacy

The Motivation Behind Beale’s Mystery

Contradictory to the recurring theme of cryptography, it seems as though a certain cipher shall remain impervious to the demystifying test of time. After 100 years of collective effort from professional and amateur cryptanalysts alike, the enticing Beale cipher continues … Continue reading Continue reading

Posted in Beale, Student Posts, Treasure, Uncracked | Comments Off on The Motivation Behind Beale’s Mystery

Deciphering the Great Cipher

For an impressive two-hundred years, the Great Cipher of Louis XIV thwarted several generations of accomplished cryptanalysts – a surprising feat, given that it did so through the manipulation of a substitution cipher. The cipher was created by the son-and-father … Continue reading Continue reading

Posted in bazeries, great cipher, Rossignol, Student Posts, syllables | Comments Off on Deciphering the Great Cipher

Frequency Analysis in a Temporal Context

Today even amateurs, given time, are intuitively predisposed to recognize otherwise “logical” patterns strewn in ciphers and codes alike. This is due to the fact that analytic methods now utilized in the realm of cryptanalysis are not products of innate … Continue reading Continue reading

Posted in cryptography, education, frequency analysis, Student Posts | Comments Off on Frequency Analysis in a Temporal Context