random design
:Home:
:Links:
:Handouts:
:Schedule:
:Grades:

Friday, August 4, 2006

A paper by Brandi Dawn Brown (now Brandi Hollis) about the the enigma cipher machine.


Tuesday, September 8, 2005

Here are some articles that I found on the web about the vulerablity of a hashing function which is commonly used in modern cryptographic applications.  These all appeared in newspapers in March of 2005 although I don't have exact references for the dates of their publication for all of them.
In case you have doubts about the relevancy of hash functions to everyday life, here is a followup story dated August 12, 2005 about how this flaw was exploited to get out of a traffic ticket.  Builders UK.

The codes discussed in those articles are in a family called Secure Hash Algorithm or SHA. They are generally used to digitally sign a document by producing a code which is unique to that document. Documents can be authenticated as long as every one is sent to a unique signature, the problem arises when there are 'collisions' or two documents are assigned the same hash value. The vulernability reported early this year was with SHA-0. Here is an article dated August 2005 which says that the more secure brother of this algorithm, SHA-1, might be less secure than orginally thought. The article says that this algorithm was going to be phased out in 2010 but this news could speed up that timetable.
Security Focus.

Friday September 23, 2005
In the Globe and Mail the other day there was an article about a researcher at U of Toronto who is doing work in quantum cryptography. Our class is still talking about historical ciphers and how to break them, we will learn a little 'modern cryptography' (public key) later this term, and quantum cryptography is really modern in that the mathematics and engineering needed to make it work hasn't been developed yet.

:Home:
:Links:
:Handouts:
:Schedule:
:Grades:
random design