SAMPLE ALL THE FLAVORS!Increasingly, Vanderbilt instructors are incorporating blogs into their course design. Course Blogs at Vanderbilt is a mash-up of live feeds representing a wide variety of Vanderbilt courses that use blogging to help students reflect on, comment about, and introduce new ideas to course material. Click on the blog title to view the originating course blog. You can also click on the Participating Blogs tab for links to each blog.
ADD YOUR COURSE BLOG TO THIS SITE!Are you administering or participating in a course blog as at Vanderbilt? SEND US THE URL and we'll include it on this site.
Category Archives: NSA
At the time Singh wrote the novel, there was no blatant reason for the government to use surveillance for the interest of national security. Then September 11, 2001 happened. This day completely changed the interests of both the American citizens … Continue reading → Continue reading
One of the things which stood out to me throughout the book Little Brother was how it was so easy for even everyday people to foil the security measures put in place by the Department of Homeland Security. One of … Continue reading → Continue reading
The National Security Agency has one main priority, the protection analysis of communications, both domestic and foreign , that pose a threat to the United states of America. The NSA would be unable to do their job if they weren’t able to … Continue reading → Continue reading
When Horst Feistel developed the Lucifer system for encrypting information on computers, it had an infinite number of keys that could be used to encipher so it would actually be beyond the code breaking abilities of the National Security Agency (NSA). … Continue reading → Continue reading
Cryptography has always been about outdoing and outperforming the cryptanalytic efforts of others, trying to create an unbreakable, perfectly secure code. Today with the help of computers we have been able to get closer than ever before, creating encryptions that cannot be … Continue reading → Continue reading
Computers, by their simple invention, launched the complexity of cryptography to levels of security that before had seemed unattainable. Ciphers could not only be computed quicker, with more efficiency, and with less chance of human error, but also the amount of cryptanalysis required … Continue reading → Continue reading
When the Data Encryption Standard (DES) was created, the National Security Agency made sure that it was weak enough that they could break it. The Data Encryption Standard was a result of Horst Feistel’s product, Lucifer. Lucifer was a machine … Continue reading → Continue reading
Though almost every American instinctively cringes at the mention of government limiting freedoms and invading privacy, I believe that often this invasion of privacy is a necessary evil to ensure safety. By limiting the DES, or Data Encryption Standard, to 56 bits … Continue reading → Continue reading
In the 1970’s, Internet was still new technology and cryptography was not even considered a legitimate field of mathematics. Cryptography was considered a pen and paper tactic for wartime security and the general public was not equipped to apply any … Continue reading → Continue reading