Cryptography (nonfiction): Difference between revisions

From Gnomon Chronicles
Jump to navigation Jump to search
No edit summary
No edit summary
 
Line 36: Line 36:
* [http://en.wikipedia.org/wiki/Cryptography Cryptography] @ Wikipedia
* [http://en.wikipedia.org/wiki/Cryptography Cryptography] @ Wikipedia
* [https://www.coursera.org/learn/crypto Cryptography I] @ Coursera
* [https://www.coursera.org/learn/crypto Cryptography I] @ Coursera
* [https://boingboing.net/2019/09/10/rule-of-law-security.html Creating a "coercion resistant" communications system] @ Boing Boing
* [https://boingboing.net/2019/09/10/rule-of-law-security.html Creating a "coercion resistant" communications system] @ Boing Boing - "... systems designers [should] contemplate ways to arbitrage both the rule of law and technical pre-commitments to make it harder for governments to force you to weaken the security of your product or compromise your users."


[[Category:Nonfiction (nonfiction)]]
[[Category:Nonfiction (nonfiction)]]
[[Category:Cryptography (nonfiction)]]
[[Category:Cryptography (nonfiction)]]

Latest revision as of 06:29, 13 September 2019

"Cryptogramme du Forban" trouvé à l'île Mahé. C'est un message chiffré, lancé dans la foule par le pirate La Buse montant au supplice, qui révélerait l'emplacement de ses trésors (Bibliothèque Nationale).

Cryptography (or cryptology; from Greek κρυπτός kryptós, "hidden, secret"; and γράφειν graphein, "writing", or -λογία -logia, "study", respectively) is the practice and study of techniques for secure communication in the presence of third parties (called adversaries).

More generally, it is about constructing and analyzing protocols that block adversaries.

Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, and electrical engineering.

Cryptography prior to the modern age was effectively synonymous with encryption, the conversion of information from a readable state to apparent nonsense.

The originator of an encrypted message shared the decoding technique needed to recover the original information only with intended recipients, thereby precluding unwanted persons from doing the same.

Since World War I and the advent of the computer, the methods used to carry out cryptology have become increasingly complex and its application more widespread.

In the News

Fiction cross-reference

Nonfiction cross-reference

External links: