Tags » Cryptography

Unsolved cipher mystery: Spaniard says he's cracked Dead Pigeon code

Back in 2012, a man in the South of England was apparently renovating his chimney when he came across the skeleton of a pigeon. 935 more words

Featured

Getting by without passwords: the case for hardware tokens (part I)

For an authentication technology everyone loves to hate, there is still plenty of activity around passwords:

  • May 7 was international password day. Sponsored by the likes of MSFT, Intel and Dell the unofficial website urges users to “pledge to take passwords to the next level.”
  • 1,299 more words
Security

10 Security Domain

  1. Access Control Systems and Methodology
  2. Telecommunications and Network Security
  3. Information Security Governance and Risk Management
  4. Software Development Security
  5. Cryptography
  6. Security Architecture and Design Security Operations…
  7. 15 more words
Information Security Governance And Risk Management

Cryptography: Cracking the Code Part I

“HIQGPX OLQ KLBFO VYIR CRQN IOWVAKLBFK CII T YVGRX TFRQPEGUI VF XAGWG FJ NK AJF HH” – AWCRG TKMOFZ

How could you even start cracking this code (or writing one)? 586 more words

The Bletchley Park Codebreakers

What Ashley Madison got right

Amongst the hyperbole and horror of the Ashley Madison hack there is a bit of good news. OK, perhaps not exactly good news, but some more bad news that might have happened and didn’t. 1,119 more words

Featured

ProCodeCG Kids Programming Class 29 Aug 2015 - Simple Encryption

Today. We learned some encryption. Yeah :)

The encryption for today is simple substitution ;)

The kids had to type down everything to find out what “encryption” means. 168 more words

Coding

Difference Between AES and Twofish

http://www.differencebetween.net/technology/difference-between-aes-and-twofish/

“The Advanced Encryption Standard, or AES, is currently the latest standard that has been adopted by United States government for encrypting top secret information. The label of AES was not initially meant for a single encryption method; instead it was a competition between many. 38 more words