Category Archives: amateur cryptography

Yes, You’re Smarter than a(n Ancient) Fifth Grader

The first chapter of Simon Singh’s The Code Book introduces the historical roots of secret writing. Steganography, the practice of hiding the existence of messages, dates as far back as to the Greco-Persian Wars in the fifth century B.C. The practice of cryptography was a novel and unchartered concept for the early Greek, Roman and […] Continue reading

Posted in amateur cryptography, history, modern technology, Student Posts | Comments Off on Yes, You’re Smarter than a(n Ancient) Fifth Grader

Uncertain Environments Generate Safer Practices

An environment in which one knows he or she must constantly maintain precautions is safer than one where they are unaware of the dangers that potentially exist.   This concept is exemplified in the case of Mary Queen of Scots by the simple fact that her naive belief that she was speaking in secrecy directly […] Continue reading

Posted in amateur cryptography, cryptanalysis, cryptography, Mary Queen of Scots, monoalphabetic subsitution, polyalphabetic substitution, Student Posts | Comments Off on Uncertain Environments Generate Safer Practices

The Dangers of Weak Cryptography

For one who is not well-versed in “cryptography,” hearing the word might simply bring to mind the language game Pig Latin. However, Singh is trying to convey, in layman’s terms, that cryptography is not a child’s game for all; in Mary Queen of Scots’ case, it was literally an instance of life or death. The […] Continue reading

Posted in amateur cryptography, cryptanalysis, security, Singh, Student Posts, The Code Book, weak cryptography | Comments Off on The Dangers of Weak Cryptography

The Dangers of Weak Cryptography

For one who is not well-versed in “cryptography,” hearing the word might simply bring to mind the language game Pig Latin. However, Singh is trying to convey, in layman’s terms, that cryptography is not a child’s game for all; in Mary Queen of Scots’ case, it was literally an instance of life or death. The […] Continue reading

Posted in amateur cryptography, cryptanalysis, security, Singh, Student Posts, The Code Book, weak cryptography | Comments Off on The Dangers of Weak Cryptography

The Dangers of Weak Cryptography

For one who is not well-versed in “cryptography,” hearing the word might simply bring to mind the language game Pig Latin. However, Singh is trying to convey, in layman’s terms, that cryptography is not a child’s game for all; in Mary Queen of Scots’ case, it was literally an instance of life or death. The […] Continue reading

Posted in amateur cryptography, cryptanalysis, security, Singh, Student Posts, The Code Book, weak cryptography | Comments Off on The Dangers of Weak Cryptography

Cryptography 1

        As the author of the code book, Simon Singh, writes, “Cryptanalysis could not be invented until a civilization had reached a sufficiently sophisticated level of scholarship in several disciplines, including mathematics, statistics, and linguistics.” People’s interest and skills toward all kinds of puzzles including cryptogram are getting developed fast in this […] Continue reading

Posted in amateur cryptography, internet, Singh, Student Posts | Comments Off on Cryptography 1

Chapter 1 Assignment

In the chapter 1 of The Code Book, Singh wrote that “Cryptanalysis could not be invented until a civilization had reached a sufficiently sophisticated level of scholarship in several disciplines, including mathematics, statistics, and linguistics.” It is a reasonable comment for the reason as belows. First of all, only if a civilization has developed mathematical methods, […] Continue reading

Posted in amateur cryptography, Chapter 1, cryptanalysis, Student Posts | Comments Off on Chapter 1 Assignment

You Don’t Need to Be Trained to Be Professional

With sophisticated and detailed research on statistics, al-Kindī invented his system of cryptanalysis, later known as the frequency analysis. It’s not surprised that he was considered as the greatest scientist in the ninth century when many disciplines including mathematics, statistics and linguistics that are well developed today were still in their rudimentary stages; thus his […] Continue reading

Posted in amateur cryptography, cryptanalysis, frequency analysis, Student Posts | Comments Off on You Don’t Need to Be Trained to Be Professional

4 Codes, 1 Sculpture: Kryptos

During the talk Elonka gave to the class on Friday, I found myself fixating on one thing, Kryptos. I was so surprised by the fact that there was a statue located on the grounds of the CIA, which has an unsolved code written on it. The CIA are supposed to be some of the greatest […] Continue reading

Posted in amateur cryptography, Elonka Dunin, Kryptos, Student Posts, Vigenere Cipher | Comments Off on 4 Codes, 1 Sculpture: Kryptos

The Correlation Between Technology and Self-Taught Cryptography

When the frequency analysis first emerged as a tool to decrypt substitution cyphers, it was the epitome of modern technology at the time.  Under the growing Islamic rule of the Arab nations there was, for the first time in history, the opportunity for the collection of mass amounts of diverse knowledge in one place and one time. Revolutionary at […] Continue reading

Posted in amateur cryptography, education, internet, Student Posts | Comments Off on The Correlation Between Technology and Self-Taught Cryptography