Category Archives: Computer Cryptography

The Question of Accountability

On page 315, Singh writes that Zimmerman, through a friend, “simply installed [PGP] on an American computer, which happened to be connected to the Internet. After that, a hostile regime may or may not have downloaded it.”  Although Zimmerman’s actions possibly enabled criminals to gain access to better encryption, he should not be held accountable […] Continue reading

Posted in accountability, Computer Cryptography, PGP, Student Posts | Comments Off on The Question of Accountability

Cryptography in the Modern World: Keeping a Information Secret in the Age of Computing

In the first chapter, the examples of cryptography Singh selected were confined to the upper echelons of society: nobles, scholars, religious and military leaders. But perhaps more telling is the affluence of cryptanalysts such as Thomas Phelippes, a linguist fluent in five languages and an accomplished code-breaker; knowing five languages is a feat even in […] Continue reading

Posted in Computer Cryptography, education, Modern Cryptography, security, Student Posts | Comments Off on Cryptography in the Modern World: Keeping a Information Secret in the Age of Computing

Computer Cryptography

In the chapter titled “Forays,” of Neal Stephenson’s Cryptonomicon, bit-key encryption is introduced as a method maintaining secrecy between the characters Randy and Avi. Unlike the other characters of the novel, Randy and Avi occupy the modern times and must … Continue reading Continue reading

Posted in Computer Cryptography, Cryptonomicon, Student Posts | Comments Off on Computer Cryptography