Category Archives: Encryption

Pretty Good Predictions

Before even seeing this question, I already had something to say about the predictions that Singh made in this paragraph. The one that stood out to me was that democracies will be using online voting. I found this funny because 20 years from the writing of this book, online voting still doesn’t exist, and the […] Continue reading

Posted in Encryption, online voting, Student Posts, The Code Book | Comments Off on Pretty Good Predictions

Why Strong Encryption to General Public

In the age of digital technology, access to encryption is of similar importance as the access to free speech. While the arguments against public encryption technology are certainly valid considering public security, it’s unreasonable to deny the public access to such a critical element of online communication, especially since most communications using encryption don’t concern […] Continue reading

Posted in Encryption, security, Singh, Student Posts | Comments Off on Why Strong Encryption to General Public

Not making the world a better place

Admittedly, restricting strong encryptions by the law enforcement and national security agencies do have some advantages toward crime fighting. However, the law enforcement and national security agencies can’t deny people’s right to protect their own privacy. Singh noted: ”Civil libertarians argue that the widespread use of encryption is essential for guaranteeing the right to privacy.” […] Continue reading

Posted in Encryption, Student Posts, terrorism, wiretap | Comments Off on Not making the world a better place

Why Encryption is for All

At this point, the cat is out of the box with regards to encryption. Available to all internet users are extremely secure encryption systems, and this is why trying to limit their use is a mistake. Strong encryption should be available to all internet users. Pretty much as it stands, terrorists or people engaging in […] Continue reading

Posted in code book, Encryption, FYWS, RSA, Student Posts | Comments Off on Why Encryption is for All

An invention to win the war

When you think about the World War, there must be a scene or a voice in your mind that broadcasts the radio talks. The classic voice with electronic noises in the movies probably has made an impression. I didn’t know about the source of the noise before. I used to thought that the voices were […] Continue reading

Posted in Encryption, Homer Dudley, Student Posts, Voder | Comments Off on An invention to win the war

Solving an Encryption is Easier Said than Done

I believe that the examples in the book would be harder to decipher when no assistance is given. It would be hard to decipher the message while not knowing what type of cipher it is. Telling the readers what kind of code the message is encrypted as gives a hint in how to solve it. […] Continue reading

Posted in decipher, Encryption, Student Posts, The Code Book | Comments Off on Solving an Encryption is Easier Said than Done

The Race Between Cryptanalysis and Encryption

The status quo of cryptography can be accurately represented by a game of tennis between two equally good players. When a strong cipher is developed, the ball moves to cryptanalysis. Upon development of better decryption techniques, the ball returns back to the court of the encryptors. The period in which an event happens in the […] Continue reading

Posted in cryptanalysis, Encryption, Mary Queen of Scots, Student Posts, Vigenère | Comments Off on The Race Between Cryptanalysis and Encryption

Different Applications of Cryptography Over Time

The only records we have of cryptography used in the past come from people with the resources and technical skills to encrypt and decrypt messages, whether they were World War II spies, Arab scholars, or Greek military leaders. Although not all of the encryption methods mentioned by Singh in Chapter 1 required exceptional resources (the […] Continue reading

Posted in cipher, cryptography, Encryption, Student Posts | Comments Off on Different Applications of Cryptography Over Time

Odd Drawings and a Secret Script: The Voynich Manuscript

While perusing Elonka’s website, I was fascinated by her page of “Famous Unsolved Codes and Ciphers”. Like Sara stated in her blog post, it is so astonishing to think about how even with modern technology and current knowledge, there are still numerous ancient ciphers that have yet to be broken, including the Beale Ciphers and […] Continue reading

Posted in Beale Cipher, cryptography, decryption, Encryption, Student Posts, Voynich Manuscript | Comments Off on Odd Drawings and a Secret Script: The Voynich Manuscript

Using a VPN to Protect Privacy

One thing college students can do to protect their online privacy would be to use a VPN (Virtual Private Network). In short, a VPN encrypts a users’ data so third parties are unable to view it. They are particularly useful … Continue reading Continue reading

Posted in Encryption, privacy, Student Posts, TOR, VPN | Comments Off on Using a VPN to Protect Privacy