Recent Event Highlights: Neal Stephenson - "We Are All Geeks Now.", Neal Stephenson on Sci-Fi / Fantasy Actors, Beating the codebreakers with quantum cryptography, Exhibits unveil history of U.S. code breaking, and 16 more...
Created by dipity on Oct 20, 2008
Last updated: 01/05/09 at 02:59 AM
Web Search: History Of Cryptology has no followers yet. Be the first one to follow.
...but of cryptology and analysis," he said. "We're getting involved to help preserve what is a fundamental part of our history." He said there was a danger that with the fast-paced nature of the computer industry, it would lose a sense of its origins by constantly...
Poland Breaks the Enigma- Unbreakable German Nazi Code Machine in 1932. "Before Poland fell - said George Bush while addressing his huge audience in Gdansk in August 1989, on the eve of the 50-th anniversary of the outbreak of World War II - you gave the Allies Enigma the German Nazi's secret coding machine. Breaking the unbreakable Axis code saves tens of thousand Allied lives, American lives; and for this, you have the enduring gratitude of the American people. And ultimately, Enigma and freedom fighters played a major role in the winning the Second World War". President George Bush's Remarks at the Solidarity Workers Monument in Gdansk July 11, 1989, where he mentioned the Polish contribution to the Victory in giving to the Allies the Enigma Cipher Machine solution. On July 25, 1939, before the war began, the Polish intelligence (Section 2 of the General Staff) provided Great Britain and France with one copy each (with necessary documents) of the German coding machine "Enigma" that allowed to read the secret German messages. A team of Polish cryptologists was evacuated to France, later on to England, where a special center for monitoring and decoding was organized in Bletchley Park. The Polish "Enigma" played a significant role, especially during the Battle of Britain, Battle of the Atlantic and the invasion of the continent in 1944. Other Polish scientists and technicians evacuated to England have to be mentioned as well. The electronics specialists helped with creating the submarine detection system (HFDF -- High Frequency Direction Finding). The Polish engineers constructed the reversible tank periscope and an anti-aircraft cannon, with tens of thousands of which the British troops were equipped. Henryk Zygalski, Jerzy Rozycki and Marian Rejewski, the Polish team of mathematicians who first had success against the Enigma machine. David Kahn, Seizing the ENIGMA. Historian David Kahn writes, "was Rejewski's own stunning achievement, one that elevates him to the pantheon of the greatest cryptanalysts of all time". Rejewski used a mathematical theorem that one mathematics professor has since described as "the theorem that won World War II". BREAKS THE ENIGMA CODE MACHINE (ULTRA) was the greatest secret of World War II after the atom bomb. With the exception of knowledge about that weapon and the probable exception of the time and place of major operations, such as the Normandy invasion, no information was held more tightly .... The security implies ULTRA's significance. ULTRA furnished intelligence better than any in the whole long history of humankind. It was more precise, more trustworthy, more voluminous, more continuous, longer lasting, and available faster, at a higher level, and from more commands than any other form of intelligence - spies or scouts or aerial reconnaissance or prisoner interrogations .... It may be concluded that BREAKS THE ENIGMA CODE (ULTRA) saved the world two years of war, billions of dollars, and millions of lives. Poland suffered greatly under German occupation. Six million Poles, from a population of 35 million, became casualties. Among the dead was Jerzy Rozycki, the youngest member of the Enigma code-breakers.
Did you dream of growing up to be James Bond when you were a kid? Are you still dreaming of it? Lucky for you, becoming a spy doesn't involve getting thrown into a van with a blindfold. You can just apply on their website, like any other job.Full Digg post: http://digg.com/people/MI_6_to_CIA_5_Top_Secret_Agencies_Who_Want_to_Hire_You
Complete video at: http://fora.tv/2008/05/08/Neal_Stephenson_Science_Fiction_as_a_Literary_Genre Bestselling author Neal Stephenson discusses the popularity of science-fiction as a genre, arguing that "we are all geeks now." ----- Neal Stephenson delivered a talk entitled The Fork: Science Fiction versus Mundane Culture at Gresham College. Four professors discuss the origins of science fiction, its overlap with other genres and its developments over more than a century. Neal Stephenson is the best-selling author of such novels as Snow Crash, The Diamond Age, Cryptonomicon, and The Baroque Cycle. He is best know for writing science fiction (in the postcyberpunk genre) and his interests often lead him into investigations of society, mathematics, cryptology, currency and the history of science.
Complete video at: http://fora.tv/2008/05/08/Neal_Stephenson_Science_Fiction_as_a_Literary_Genre Bestselling author Neal Stephenson theorizes on why "niche" science-fiction / fantasy actors like Lucy Lawless, Hugo Weaving and Leonard Nimoy so often end up cast in these types of roles. ----- Neal Stephenson delivered a talk entitled The Fork: Science Fiction versus Mundane Culture at Gresham College. Four professors discuss the origins of science fiction, its overlap with other genres and its developments over more than a century. Neal Stephenson is the best-selling author of such novels as Snow Crash, The Diamond Age, Cryptonomicon, and The Baroque Cycle. He is best know for writing science fiction (in the postcyberpunk genre) and his interests often lead him into investigations of society, mathematics, cryptology, currency and the history of science.
Father Marco Fibbi, a spokesman for the Diocese of Rome, said: “Normally we read the script but this time it was not necessary. The name Dan Brown was enough.”Full Digg post: http://digg.com/movies/The_Vatican_Bans_Filming_of_Angels_Demons
A dangerous new strain of malicious software that holds the victim's computers files for ransom has been unleashed, and researchers have yet to crack the encryption key.
Full Digg post: http://digg.com/security/Ransomware_Encrypts_Victim_Files_With_1024_Bit_Key
Cryptography is an arms race, but the finish line may be fast approaching. Up to now, each time the codemakers made a better mousetrap, codebreakers breed a better mouse. But quantum cryptography theoretically could outpace the codebreakers and win the race. Forever.Full Digg post: http://digg.com/security/Beating_the_codebreakers_with_quantum_cryptography_2
Tell Norton to go to hell and switch to UbuntuFull Digg post: http://digg.com/linux_unix/With_Linux_Antivirus_Software_is_Dead_PIC
Swiss citizens recently cast their parliamentary election votes, which were transmitted using quantum cryptology, a method of encoding and decoding data using photons. Could this technology lead to more reliable voting results?Full Digg post: http://digg.com/security/How_Quantum_Cryptology_Works
The scummy truth about the military recruitment complex.Full Digg post: http://digg.com/odd_stuff/Top_Military_Recruitment_Lies
A new AP-Ipsos poll finds that 34 percent of conservatives have not read a book within the past year, compared with 22 percent of liberals and moderates. Among those who had read at least one book, conservatives “typically read eight” books in the past year. Liberals read nine, moderates five.Full Digg post: http://digg.com/political_opinion/POLL_Liberals_Read_More_Books_Than_Conservatives
...them and help them understand their amazing legacy,” museum curator Patrick Weadon said. The museum follows the history of cryptology from the Civil War to the present, including an exhibit showing how black slaves used code. Even with the inclusion of modern...
Anyone actually trying to use the Processing Key on new HD-DVD titles may be in for a bit of a surprise. It appears as if disks created after April 23rd cannot be decrypted using the key. Some players have been also been affected. Ed Felton, a professor of computer science at Princeton University, estimates 3 weeks until we have a new number.Full Digg post: http://digg.com/hardware/The_Number_Has_Been_Rendered_Useless_Does_Not_Work_On_Newer_Titles
"I am a scientist and a believer, and I find no conflict between those world views."Full Digg post: http://digg.com/general_sciences/Collins_How_a_scientist_can_believe_in_God
The real tragedy is that, because mathematics is a heavily layered subject, each new topic building upon the previous ones, once students fall behind catching up can be a nightmare. Indeed, students often meet a rude awakening in late high school or at college when their limited mathematical repertoire fails to provide the necessary tools.Full Digg post: http://digg.com/programming/The_Shocking_State_of_Math_Education_in_America
...Walker & Co. ($19.95) Looking for a history book that would appeal to people who like math? Try "Codebreaker" - a short history of cryptology: the study of codes and ciphers. Journalist Stephen Pincock, who is an editor at The Financial Times and The Scientist...
Knight-Ridder Washington Bureau
...shared his knowledge as a consultant on a “Secrets of War” television documentary and contributed articles to cryptology and history journals. Much of his writing countered controversial charges that code-breaking provided U.S. officials with advance knowledge...
San Diego Union Tribune
The 600 year old, one-of-a-kind book is known as the Voynich Manuscript. The textual content of this mysterious illustrated book is unknown because it is written in an unknown alphabet and unintelligible language, and despite the efforts of expert cryptographers over many decades, not a single word has been decipheredFull Digg post: http://digg.com/tech_news/the_Mysteriously_Illustratrated_600_yr-old_Cryptic_Voynich_Manuscript
We’re the CryptoKids and we love cryptology.
What’s cryptology? Cryptology is making and breaking codes. It’s so cool. We make codes so we can send secret messages to our friends. And we try to figure out what other people are writing about by breaking their codes. It’s a lot of fun.Full Digg post: http://digg.com/security/NSA_cryptography_for_kids