Author Archives: whitnese

The Writing Process

The first part of my process for writing the practical cryptography paper was selecting a topic. This was quite time consuming since nothing that I found particularly stood out at me. The main problem with selecting a topic was finding something interesting, applicable, and with enough information available. I eventually settled upon Bitcoin. The reason […] Continue reading

Posted in Bitcoin, cryptography, essay process, Practical Cryptography, Student Posts | Comments Off on The Writing Process

The Importance of Privacy

The government does not have the right to infringe upon the privacy and security of United State’s citizen. The proposed idea of the government being given ”wide latitude” of surveillance breaches these privacy barriers that are protected by the Constitution. … Continue reading Continue reading

Posted in Government, privacy, Rights, security, Student Posts, technology | Comments Off on The Importance of Privacy

Noticing Patterns

One reason that the code breakers were eventually successful over the German cryptographers was the identification of patterns in the Enigma codes. There were certain key discoveries that aided in the eventual crack of the codes. One of these discoveries … Continue reading Continue reading

Posted in cryptanalysis, enigma, keys, patterns, Student Posts | Comments Off on Noticing Patterns

Extreme Security Measures

The book Little Brother by Cory Doctorow brought up many ideas and concepts that I did not know or think about. The idea of privacy and security and these wide spread implications were well illustrated in his novel. The concept … Continue reading Continue reading

Posted in data mining, little brother, safety measures, security, Student Posts | Comments Off on Extreme Security Measures

Agony columns the old version of love notes

There was increased interest in cryptography and this interest still persists today. Part of the drive in this interest was the telegraph. This is due to the need to protect and hide personal or private information that would be sent … Continue reading Continue reading

Posted in agony columns, cryptanalysis, cryptography, Singh, Student Posts | Comments Off on Agony columns the old version of love notes

Tor is the key to online security

Online privacy is a major concern for college students and Internet users in general. Users of the Internet put so much information on it from credit card information, communication, and personal information. There are various steps that users can take … Continue reading Continue reading

Posted in internet, privacy, routing, security, Student Posts, TOR | Comments Off on Tor is the key to online security

Blog Post #1

I can honestly say that going into this class I had very little knowledge of what cryptology is or its implications. I had most likely heard the word in passing but never fully tried to comprehend the true meaning. The … Continue reading Continue reading

Posted in cryptography, history, Mary Queen of Scots, Student Posts, The Code Book | Comments Off on Blog Post #1