For my project, one of the translators of the codes was Elonka Dunin. She has a long list of accomplishments that pertain to cryptology. One of the most interesting things that I find about her is her list of famous unsolved codes and ciphers. It is interesting to compare and contrast the codes and see if there are any similarities between them. My cipher is related to one of the most famous unsolved ciphers that is "Kryptos." Part of my code is incorporated with this code. If anyone has a chance, you should check out this cite. It is REALLY cool to read the descriptions of the codes. I promise they aren't hard codes to read about, and there is extra information on the codes if you would like it.
Here is the link:
http://elonka.com/UnsolvedCodes.html
Cyber Ciphers
Wednesday, November 16, 2011
Steganography
This isn't relevant to my post at all, but I typed in cryptology to the google search bar and one of the blogs from our class popped up. So anyone who is in the least bit curious about cryptology learns something from someone in our class. EPIC.
We talk a lot in our class about cryptology, but I was more curious about steganography. I posted a while ago about the definition but this new website I found has more information. There are two different parts of this website that is the "Guide to Steganography." I think it is really cool so I hope someone checks this out!
Part 1: http://www.businessinsider.com/a-guide-to-steganography-part-1-how-to-hide-secret-messages-in-images-2011-10
Part 2: http://www.businessinsider.com/a-guide-to-steganography-part-2-how-to-hide-files-and-archives-in-text-files-2011-10
We talk a lot in our class about cryptology, but I was more curious about steganography. I posted a while ago about the definition but this new website I found has more information. There are two different parts of this website that is the "Guide to Steganography." I think it is really cool so I hope someone checks this out!
Part 1: http://www.businessinsider.com/a-guide-to-steganography-part-1-how-to-hide-secret-messages-in-images-2011-10
Part 2: http://www.businessinsider.com/a-guide-to-steganography-part-2-how-to-hide-files-and-archives-in-text-files-2011-10
Monday, November 7, 2011
Another View
I was looking around on the internet for anything about cryptology. I am not exactly sure how I stumbled upon the website, but the website I found is pretty cool. This website allowed me to hear a second opinion on cryptology. The aspect about "Traditional Cryptology" was very interesting because we have covered a lot of that material. (eg. The Enigma Machine) However, the difference is that this website has a page dedicated to how Quantum Cryptology works. It also has a page that talks about traditional cryptology issues, as well as how to use quantum cryptology. The articles are fairly short so everyone should check it out!
http://science.howstuffworks.com/science-vs-myth/everyday-myths/quantum-cryptology.htm
http://science.howstuffworks.com/science-vs-myth/everyday-myths/quantum-cryptology.htm
Cyrillic Project Code
I am doing the Cyrillic Projector Code as my code for my project. This is a code that is located in Langley, Virginia at the CIA headquarters. I personally think that this code is amazing, because it is art as well. At night a light shines through the artwork which projects an incredibly beautiful sight. This code is intricate. A very interesting part of this code is that it has four parts. Three of the parts have been deciphered, however, one has not. The one that has not been cracked is Kryptos. I believe that the artist is talented in many different aspects because he not only has beautiful artwork, but he created a challenging code to crack. Jim Sanborn, the artist, is a jack of all trades.
Monday, October 31, 2011
Wall Street
Everyone has heard about the Occupy Wall Street, I think that is too controversial of an issue to comment on. However, Wall Street does relate to cryptology. Think about algorithms. That is one aspect that absolutely fuels Wall Street. Long equations are used instead of the simplistic poly alphabetic substitutions. Of course algorithms are used for ATM's, but particularly online algorithms are used. The encryption process for online websites to make sure your information is secure is simply algorithms. This is the immediate connection between Wall Street and cryptology!
Copiale Cipher
I just came upon a video about the Copiale Cipher. This video includes how they initially thought the text would be decoded, how they were mistaken, how the text was actually deciphered among other things. They discuss what the text says. There were 75,000 characters used in this 105 page book written completely in code. The oddest part about this is that the book is written by eye enthusiasts. It is such an odd field to write in code about, but it is truly the method of decryption and encryption that makes the Copiale Cipher so intriguing.
Click on the link that pops up when you click the words below!
Copiale Cipher
Click on the link that pops up when you click the words below!
Copiale Cipher
Monday, October 24, 2011
Encryption
There are many methods that contain codes and pertain to computers. However, I started thinking about hacking computers and how that requires codes. Think about it, what happens when your computer is hacked? Well for me, I would have opened an encrypted file or encrypted website. All of these issues occur from encryption and these issues then all originate from cryptology. It is interesting to see how many ways cryptology affects our lives.
Subscribe to:
Posts (Atom)