SAMPLE ALL THE FLAVORS!Increasingly, Vanderbilt instructors are incorporating blogs into their course design. Course Blogs at Vanderbilt is a mash-up of live feeds representing a wide variety of Vanderbilt courses that use blogging to help students reflect on, comment about, and introduce new ideas to course material. Click on the blog title to view the originating course blog. You can also click on the Participating Blogs tab for links to each blog.
ADD YOUR COURSE BLOG TO THIS SITE!Are you administering or participating in a course blog as at Vanderbilt? SEND US THE URL and we'll include it on this site.
Category Archives: NSA
The passage that stuck out to me the most from the novel was Marcus’ description of the use and benefits of cryptography from page 57. Even though it’s at the beginning of the book, this passage gets to the core of how cryptography works for us today. Cryptography is used by everyone because is as […] Continue reading
“How to save the Net: Break up the NSA.” This is a bold statement for a bold article. Bruce Schneier, renowned cryptographer and writer, bravely authored this article for Wired as a part of the “Save the Net” series, “featuring bold solutions to the biggest problems facing the Internet today.” Schneier proposes that the NSA […] Continue reading
At the time Singh wrote the novel, there was no blatant reason for the government to use surveillance for the interest of national security. Then September 11, 2001 happened. This day completely changed the interests of both the American citizens … Continue reading → Continue reading
One of the things which stood out to me throughout the book Little Brother was how it was so easy for even everyday people to foil the security measures put in place by the Department of Homeland Security. One of … Continue reading → Continue reading
The National Security Agency has one main priority, the protection analysis of communications, both domestic and foreign , that pose a threat to the United states of America. The NSA would be unable to do their job if they weren’t able to … Continue reading → Continue reading
When Horst Feistel developed the Lucifer system for encrypting information on computers, it had an infinite number of keys that could be used to encipher so it would actually be beyond the code breaking abilities of the National Security Agency (NSA). … Continue reading → Continue reading
Cryptography has always been about outdoing and outperforming the cryptanalytic efforts of others, trying to create an unbreakable, perfectly secure code. Today with the help of computers we have been able to get closer than ever before, creating encryptions that cannot be … Continue reading → Continue reading
Computers, by their simple invention, launched the complexity of cryptography to levels of security that before had seemed unattainable. Ciphers could not only be computed quicker, with more efficiency, and with less chance of human error, but also the amount of cryptanalysis required … Continue reading → Continue reading
When the Data Encryption Standard (DES) was created, the National Security Agency made sure that it was weak enough that they could break it. The Data Encryption Standard was a result of Horst Feistel’s product, Lucifer. Lucifer was a machine … Continue reading → Continue reading
Though almost every American instinctively cringes at the mention of government limiting freedoms and invading privacy, I believe that often this invasion of privacy is a necessary evil to ensure safety. By limiting the DES, or Data Encryption Standard, to 56 bits … Continue reading → Continue reading