CRYPTOLOGY AND CODE-

sunflowerplateΤεχνίτη Νοημοσύνη και Ρομποτική

21 Νοε 2013 (πριν από 3 χρόνια και 11 μήνες)

91 εμφανίσεις

THE IMPORTANCE OF
CRYPTOLOGY AND CODE
-
BREAKING ON MODERN LANGUAGE
AND PRIVACY

By: David McDonald

Why codes are important?

We intend to begin on the first of February unrestricted submarine
warfare. We shall endeavor in spite of this to keep the United
States of America neutral. In the event of this not succeeding, we
make Mexico a proposal of alliance on the following basis: we
make war together, make peace together, generous financial
support and an understanding on our part that Mexico is to
reconquer

the lost territory in Texas, New Mexico, and
Arizona.

Knowledge Issues



How does one keep important messages
secret in a time when all languages are
public?


How important is secrecy when it comes to
language?


To what extent is secrecy important in a time
when anyone can find anything by doing a
simple web search?


How can people dictate what others see
through the use of codes?

Privacy

Imagine this…

Perfect Secrecy


How would you win the game?


-

the locks are a decoy


-

don’t put your card in the box


-

place the card back in the deck


-

shuffle



Why does this work?


-

it’s all about the patterns


> just like decrypting codes



> codes have patterns

Meet me at
Scorpion Ridge.

Theory of Knowledge


How do people dictate what others see?


-

how can the encryption of codes be an

example of this?


How is the age of public information making
it harder for people to communicate in
private?


To what extent would it be possible to
communicate privately through sites like
Twitter or
Facebook
?

Codes in the Digital Age

Implications of Knowledge:

What to leave here with…


Could a trivial message be seen as important
when encrypted?


How do we go about making things private in
such a public world?


Has the world’s information become so public,
that there is no way of keeping it secret?


What is the importance and the implications of
keeping language, communication, and
messages private on a domestic, national, and
international level?


Works Cited

Code Makers & Code Breakers,
Cryptologoy

(2/3)
. History Channel,
n.d
.
Documentary.
Youtube
. History Channel, 11 June 2011. Web.
22 Apr. 2013. <http://www.youtube.com/watch?v=wStSsqR3Q5Y>.

Lindsay, James M. "Council on Foreign Relations."

The Water's Edge
. Council on Foreign Relations, 1 Mar. 2011. Web. 23 Apr. 2013.
<http://blogs.cfr.org/lindsay/2011/03/01/twe
-
remembers
-
the
-
zimmermann
-
telegram/>.

"Perfect Secrecy | Journey into Cryptography |Khan Academy."

Khan Academy
. Khan Academy,
n.d
. Web. 26 Apr. 2013.
<https://www.khanacademy.org/math/applied
-
math/cryptography/crypt/v/perfect
-
secrecy>.

"
Polyalphabetic

Cipher | Journey into Cryptography |Khan Academy."

Khan Academy
. Khan Academy,
n.d
. Web. 26 Apr. 2013.
<https://www.khanacademy.org/math/applied
-
math/cryptography/crypt/v/polyalphabetic
-
cipher>.

Vacca
, John R. "Public Key Infrastructures (PKIS): What Are They?"

Public Key Infrastructure: Building Trusted Applications and Web
Services
. United States:
Auerbach
, 2004. 7
-
9.

Google Books
. Google, 2004. Web. 25 Apr. 2013.
<http://books.google.com/books?id=3kS8XDALWWYC&pg=PA8#v=onepage&q&f=false>.