Posted on

Cryptography–Encryption

WE improve with the improvement of Humanity; nor without the improvement of the whole can you hope that your own moral and material conditions will improve. Generally speaking, you cannot, even if you would, separate your life from that of Humanity; you live in it, by it, for it. Your souls, with the exception of the very few men of exceptional power, cannot free themselves from the influence of the elements amid which they exist, just as the body, however robust its constitution, cannot escape from the effects of corrupt air around it. How many of you have the strength of mind to bring up your sons to be wholly truthful, knowing that you are sending them forth to persecution in a country where tyrants and spies bid them conceal or deny two-thirds of their real opinions? How many of you resolve to educate them to despise wealth in a society where gold is the only power which obtains honors, influence, and respect, where indeed it is the only protection from the tyranny and insults of the powerful and their agents? Who is there among you who in pure love and with the best intentions in the world has not murmured to his dear ones in ItalyDo not trust men; the honest man should retire into himself and fly from public life; charity begins at home,—and such-like maxims, plainly immoral, but prompted by the general state of society? What mother is there among you who, although she belongs to a faith which adores the cross of Christ, the voluntary martyr for humanity, has not flung her arms around her son’s neck and striven to dissuade him from perilous attempts to benefit his brothers? And even if you had strength to teach the contrary, would not the whole of society, with its thousand voices, its thousand evil examples, destroy the effect of your words? Can you purify, elevate your own souls in an atmosphere of contamination and degradation?   1
  And, to descend to your material conditions, do you think they can be lastingly ameliorated by anything but the amelioration of all? Millions of pounds are spent annually here in England, where I write, by private charity, for the relief of individuals who have fallen into want; yet want increases here every year, and charity to individuals has proved powerless to heal the evil—the necessity of collective organic remedies is more and more universally felt.…   2
  There is no hope for you except in universal reform and in the brotherhood of all the peoples of Europe, and through Europe of all humanity. I charge you then, O my brothers, by your duty and by your own interest, not to forget that your first duties—duties without fulfilling which you cannot hope to fulfil those owed to family and country—are to Humanity. Let your words and your actions be for all, since God is for all, in His Love and in His Law. In whatever land you may be, wherever a man is fighting for right, for justice, for truth, there is your brother; wherever a man suffers through the oppression of error, of injustice, of tyranny, there is your brother. Free men and slaves, YOU ARE ALL BROTHERS.

 

 

 

This is a fascinating topic… it will be a work in progress as I have uncovered a literal ton of information.

What is Cryptography and why is it important?

Cryptography (or cryptology; from Greekκρυπτός, “hidden, secret”; and γράφεινgraphein, “writing”, or -λογία-logia, “study”, respectively)[1] is the practice and study of techniques for secure communication in the presence of third parties (called adversaries).[2] More generally, it is about constructing and analyzing protocols that overcome the influence of adversaries[3] and which are related to various aspects in information security such as data confidentiality,data integrityauthentication, and non-repudiation.[4] Modern cryptography intersects the disciplines of mathematicscomputer science, and electrical engineering. Applications of cryptography include ATM cardscomputer passwords, and electronic commerce.

Cryptography prior to the modern age was effectively synonymous with encryption, the conversion of information from a readable state to apparent nonsense. The originator of an encrypted message shared the decoding technique needed to recover the original information only with intended recipients, thereby precluding unwanted persons to do the same. Since World War I and the advent of the computer, the methods used to carry out cryptology have become increasingly complex and its application more widespread.

Modern cryptography is heavily based on mathematical theory and computer science practice; cryptographic algorithms are designed around computational hardness assumptions, making such algorithms hard to break in practice by any adversary. It is theoretically possible to break such a system but it is infeasible to do so by any known practical means. These schemes are therefore termed computationally secure; theoretical advances, e.g., improvements ininteger factorization algorithms, and faster computing technology require these solutions to be continually adapted. There exist information-theoretically secure schemes that provably cannot be broken even with unlimited computing power—an example is the one-time pad—but these schemes are more difficult to implement than the best theoretically breakable but computationally secure mechanisms.

Cryptology-related technology has raised a number of legal issues. In the United Kingdom, additions to the Regulation of Investigatory Powers Act 2000 require a suspected criminal to hand over their encryption key if asked by law enforcement. Otherwise the user will face a criminal charge.[5] The Electronic Frontier Foundation (EFF) is involved in a case in the Supreme Court of the United States, which may determine whether requiring suspected criminals to provide their encryption keys to law enforcement is unconstitutional. The EFF is arguing that this is a violation of the right of not being forced to incriminate oneself, as given in the fifth amendment.[6]

http://en.wikipedia.org/wiki/Cryptography

 

Obviously it is critical for people to be able to send messages to other people or entities that they have the reasonable assumption will remain private and unbreakable. Cryptography has actually been going on since recorded time. The Computer age has changed everything in this field.

Cryptography began thousands of years ago. Until recent decades, it has been the story of what might be called classic cryptography — that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids. In the early 20th century, the invention of complex mechanical and electromechanical machines, such as the Enigma rotor machine, provided more sophisticated and efficient means of encryption; and the subsequent introduction of electronics and computing has allowed elaborate schemes of still greater complexity, most of which are entirely unsuited to pen and paper.

The development of cryptography has been paralleled by the development of cryptanalysis — the “breaking” of codes and ciphers. The discovery and application, early on, of frequency analysis to the reading of encrypted communications has, on occasion, altered the course of history. Thus the Zimmermann Telegram triggered the United States’ entry into World War I; and Allied reading of Nazi Germany‘s ciphers shortened World War II, in some evaluations by as much as two years.

Until the 1970s, secure cryptography was largely the preserve of governments. Two events have since brought it squarely into the public domain: the creation of a public encryption standard (DES), and the invention of public-key cryptography.

 

http://en.wikipedia.org/wiki/History_of_cryptography

 

Article from the Daily Beast the other day..

This month the National Security Agency (NSA) declassified 23 years’ worth of issues of “Cryptolog,” the newsletter written by and for the code-breakers, linguists, and computer scientists at the U.S. government’s most secretive intelligence organization. The issues span from 1974 to 1997.

130328-Lake-NSA-tease
NSA

One article, from 1997, predicted a coming “cyber war,” complete with “worms, logic bombs, trojan horses” that could be “extremely destructive.” Other pieces introduced NSA employees to the inside workings of the agency’s own television network. Other newsletters include pieces on a wide range of topics, from how to learn language through hypnosis to an exploration of how the Soviet Union encodes military communications.

http://www.thedailybeast.com/articles/2013/03/29/a-new-trove-of-nsa-documents-reveal-what-spies-read-for-fun.html

Famous Cryptographer Alan Turning award.

http://www.networkworld.com/news/2013/031313-turing-award-267635.html

Examples of some of the articles I have come across concerning this…

http://www.infosec.pku.edu.cn/course/2004/noname.pdf

Ciphers and Silver Balls

encryption

http://spectrum.ieee.org/computing/software/cryptographers-take-on-quantum-computers

Links to declassified NSA documents concerning Encryption

http://www.nsa.gov/public_info/declass/cryptologs.shtml

 

 

 

 

I have been reading a couple books on code breaking recently and had no idea it was interesting as it is. I read Neal Stephanson’s book Cryptonomicon  http://en.wikipedia.org/wiki/ and have started reading The Bletchley Park Codebreakers. http://en.wikipedia.org/wiki/Bletchley_Park.

 

 

 

 

 

Code Breaking-I have been reading a few books dealing with this.. it is amazingly interesting

http://en.wikipedia.org/wiki/Cryptanalysis

Declassified NSA documents about cryptanalysis:

http://www.nsa.gov/public_info/_files/military_cryptanalysis/mil_crypt_I.pdf

http://www.nsa.gov/public_info/_files/military_cryptanalysis/mil_crypt_II.pdf

http://www.nsa.gov/public_info/_files/military_cryptanalysis/mil_crypt_III.pdf

http://www.nsa.gov/public_info/_files/military_cryptanalysis/mil_crypt_IV.pdf

http://www.umich.edu/~umich/fm-34-40-2/

http://www.britannica.com/EBchecked/topic/145058/cryptology

EDIT:::

http://www.pbs.org/wgbh/nova/military/cryptography.html

http://www.pbs.org/wgbh/nova/physics/kryptos.html

 

I have a ton of more information. This post is about 1/3 of the way finished.. I will be back to clean it up and provide the rest of what I have later today. Hope it was interesting for you.

 

Enhanced by Zemanta

About dgarnold

More interests than I can count.. enjoy Foreign Policy, Current events, Books, Game theory,Sports (both watching and participating) and of course my Labradors. Love Mountain Biking! World class backgammon player.

30 responses to “Cryptography–Encryption

  1. Great goods from you, man. I’ve understand your stuff previous to and you’re
    just too wonderful. I actually like what you’ve acquired here, really like what you’re
    saying and the way in which you say it. You make it enjoyable
    and you still take care of to keep it sensible. I cant
    wait to read much more from you. This is really a wonderful
    website.

  2. I pay a visit everyday a few websites and websites to read content,
    however this website presents feature based posts.

  3. Hey There. I found your blog using msn. This is an extremely well written article. I will make sure to bookmark it and return to read more of your useful information. Thanks for the post. I will certainly return.

  4. Hi I am so happy I found your blog, I really found you by accident, while I was browsing on Digg for something else, Anyways I am here now and
    would just like to say thanks a lot for a tremendous post
    and a all round interesting blog (I also love the theme/design), I don’t have time to read through it all at the minute but I have book-marked it and also added in your RSS feeds, so when I have time I will be back to read a great deal more, Please do keep up the superb work.

  5. You recognize therefore considerably in terms of this topic, made me individually believe it from so many numerous angles. Its like women and men don’t seem to be interested unless it is something to accomplish with Lady gaga! Your personal stuffs great. Always take care of it up!

  6. Hey there! I know this is kind of off topic but I was wondering which blog platform are you using for this
    site? I’m getting fed up of WordPress because I’ve had problems
    with hackers and I’m looking at alternatives for another platform. I would be awesome if you could point me in the direction of a good platform.

    • dgarnold

      I know Gawker media recently switched to kinja. I really like the platform. I like WordPress and have had no problems as of yet. Hope that helps. If you want to check out kinja visit gawker or deadspin. It creates a blog for you if you sign up for an account.
      Geoff

  7. Pingback: ENIGMA | TOP-CRIME

  8. I just want to mention I’m new to blogs and actually loved your blog. More than likely I’m going to bookmark your blog . You definitely have perfect articles. Bless you for sharing with us your blog site.

  9. When someone writes an paragraph he/she keeps the thought of
    a user in his/her mind that how a user can know it. So that’s why this post is outstdanding. Thanks!

  10. If you wish for to increase your familiarity just keep visiting this web site and be updated with the
    hottest information posted here.

  11. Hmm it looks like your blog ate my first comment (it was extremely long) so I guess I’ll just sum it up what I had written and say, I’m thoroughly enjoying your blog.
    I too am an aspiring blog blogger but I’m still new to the whole thing. Do you have any helpful hints for rookie blog writers? I’d really
    appreciate it.

    • dgarnold

      Hey Thanks for the comment. I very much appreciate it. I am a rookie blogger as well. I suppose the only advice I can offer is to write about things you are passionate about or which interests you to a high degree. I am not sure there is any tricks to it. I have not gone out of the way to advertise this blog. I did say a couple things on Facebook and Twitter but that was because I wanted feedback. I never thought the blog would be popular nor did I expect such an over positive response to what I had written. I honestly have yet to have a single negative comment which shocks me more than anything. I have expected them.

  12. Emory

    We are a gaggle of volunteers and starting a new scheme in our community.
    Your web site provided us with helpful information to work on.
    You have done a formidable job and our whole community shall be thankful
    to you.

  13. Dusty

    Hey! Quick question that’s completely off topic. Do you know how to make your site mobile friendly? My blog looks weird when viewing from my apple iphone. I’m trying to
    find a template or plugin that might be able to fix this issue.
    If you have any suggestions, please share. Thank you!

    • dgarnold

      Hello Dusty

      Thank you for taking the time to visit and read some of my blog. Thank you as well for the nice comment. The only advice I can offer is perhaps look for the WordPress app in the App Store. It seems to render content in a more mobile friendly type of way.

      Take care
      Geoff

  14. Belinda

    You ought to take part in a contest for one of the highest quality websites online.
    I am going to recommend this site!

  15. seo

    hello!,I love your writing so much! share we keep up a correspondence more about your post on AOL?
    I need a specialist on this space to unravel my problem.

    Maybe that’s you! Taking a look ahead to see you.

  16. Cristina

    Every weekend i used to go to see this web site, for the reason that i want enjoyment,
    as this this web site conations genuinely pleasant funny
    stuff too.

  17. pregnancy

    Excellent blog right here! Additionally your website lots up very fast!
    What web host are you using? Can I get your associate hyperlink
    for your host? I wish my site loaded up as fast as yours lol

  18. datha.ru

    you are actually a just right webmaster. The website loading velocity is incredible.
    It seems that you’re doing any distinctive trick. Also, The contents are masterwork. you have performed a excellent task in this subject!

  19. Animation

    I must thank you for the efforts you’ve put in penning this blog. I’m hoping
    to check out the same high-grade blog posts by you later on as well.
    In truth, your creative writing abilities has inspired me
    to get my own blog now 😉

  20. iso 9001

    Ahaa, its pleasant dialogue about this post at this place at this blog, I have read all that, so at this time me also commenting here.

  21. Hi there would you mind stating which blog platform you’re working with? I’m going to start
    my own blog in the near future but I’m having a difficult time making a decision between BlogEngine/Wordpress/B2evolution and Drupal. The reason I ask is because your design and style seems different then most blogs and I’m looking for
    something completely unique. P.S Apologies for getting off-topic but I had to ask!

  22. I am really impressed with your writing skills as well as with the layout on your weblog.

    Is this a paid theme or did you customize it yourself?

    Either way keep up the excellent quality writing,
    it’s rare to see a nice blog like this one today.

  23. read more

    This web site really has all of the information and facts I wanted about this subject and didn’t know who to ask.

  24. Great blog here! Additionally your site quite a bit up fast!
    What host are you using? Can I get your associate link in your host?
    I want my website loaded up as fast as yours lol

  25. What\’s the app on the first picture?

  26. I\’ve been using iXpenseIt for quite a while as well and was almost certain that it will be featured in the Top 5.

  27. My brother recommended I would possibly like this blog.
    He used to be totally right. This publish truly made my
    day. You can not consider simply how so much time I had spent for this information!
    Thanks!

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s