Codes and Ciphers: Julius Caesar, The Enigma, and the Internet
نویسنده
چکیده
The design of code and cipher systems has undergone major changes in modern times. Powerful personal computers have resulted in an explosion of e-banking, e-commerce and e-mail, and as a consequence the encryption of...
منابع مشابه
Computational Thinking in a Liberal Arts Cryptology Course
We describe aspects of computational thinking as covered in the course Codes and Ciphers (CSC 233). 1 Cryptology and Computational Thinking Cryptology consists of cryptography and cryptanalysis, or, in other words, the making and the breaking of ciphers. History suggests that one cannot successfully do one without the other: too many ciphers were designed by enthusiasts without any knowledge of...
متن کاملPortraits of Julius Caesar: a proposal for 3D analysis
Here I suggest the use of a 3D scanning and rendering to create some virtual copies of ancient artifacts to study and compare them. In particular, this approach could be interesting for some roman marble busts, two of which are portraits of Julius Caesar, and the third is a realistic portrait of a man recently found at Arles, France. The comparison of some images indicates that a threedimension...
متن کاملA Process for Developing the Statement of Internet Research Ethics based on Action Research Method
Background: Research ethics in cyberspace or Internet research ethics (IRE) is a subset of applied ethics that aims to study, introduce, and apply ethical codes for guiding research activities in cyberspace. The compilation of the ethical statement is based on two methods of documentary research and action research. The action research process is implemented in four stages: 1) diagnosis, 2) act...
متن کاملNote on the Robustness of CAESAR Candidates
Authenticated ciphers rely on the uniqueness of the nonces to meet their security goals. In this work, we investigate the implications of reusing nonces for three third-round candidates of the ongoing CAESAR competition, namely Tiaoxin, AEGIS and MORUS. We show that an attacker that is able to force nonces to be reused can reduce the security of the ciphers with results ranging from full key-re...
متن کاملInnovation Using GPS to Enhance Data Security
messages and other documents so that only the intended recipient would be able to read them. Julius Caesar, for example, is reported to have used a substitution encryption scheme or cipher to exchange messages with his generals. Each letter in an original message was substituted with another letter obtained by shifting a fixed number of letters further along in the alphabet. So, a would be repl...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Log. Comput.
دوره 12 شماره
صفحات -
تاریخ انتشار 2002