TRENDING NEWS

POPULAR NEWS

Are There Encrypted Messages In The Writings Of The Scientific Community

How to unencrypt a connection to a server, on a single website?

Encryption Usually Takes Place in the Layer SSL part of Application Layer. It is Automated in Web Browser...

Try to Have Your Own Client Program in place of Browser and Check If it Works...

What famous saying is engraved on the entrance to the CIA Headquarters in Langley,Virginia?

http://www.fas.org/irp/cia/product/facttell/building.htm it sounds like it might be "and ye shall know the truth and the truth shall set you free."

SUPER URGENT: (Python) Write a code that assigns...?

ASSIGNMENT:
Write a program that uses a dictionary to assign "codes" to each letter of the alphabet. For
example:
codes = {’A’: ’%’, ’a’:’9’, ’B’:’@’, ’b’:’#’,etc...}
The program should open a specified text file, then use the dictionary to encrypt the file, writing the
encrypted letter to a second file. Write a second program to decrypt your encrypted letter.



>> I don't even know where to begin on this and it is due in two hours! :( Please help! I will best answer or whatever, if you would like me to XD;

Is Morse code a cryptographic technique?

The code was devised by Samuel F. B. Morse in the 1840s to work with his invention of the telegraph, the first invention to effectively exploit electromagnetism for long-distance communication.

Morse code IS NOT a cryptographic technique. I would call morse code a transmission protocol as it is a well defined public standard on how to represent individual characters with dots and dashes.


Cryptography is the art of transforming information into an unreadable format called a cypher which can only be read by thoose possesing a secret key or knowledge that allows the cypher to be transformed back into clear text that can be read.

Morse code is not secret, anyone may "decode" a clear text morse code transmission and read the message.

You can encrypt your clear text message first then transmit the encoded text (cypher) in morse code. Anyone decoding the morse ranmission would then have to decode the cypher back into clear text.


A cryptanalysis technique is a method to decipher the coded message without having the key, a.k.a codebreaking. An example of this is analysing the frequency of character use in breaking a simple substitution code.

Substitution codes replace one letter with a diferent one like shifting letter positions or reversing the order of the alphabet

Character frequency analysis of a substitution cypher uses the principal that certain letters are used more than others so frequently used characters in a substitution cipher can be identified as thoose used frequently in clear text.

This really only works with a single key substitution and character frequency analysis breaks down quickly as more substitution keys are added to the code that change with the position of the character in the message.

Other simple techniques related to code breaking require some intelligence as to what language the clear text is in and message content and message lenght.

What is the best way to protect sensitive information sent via e-mail?

1. Encryption is great when implemented properly. GPG4Win is a great solution for Windows users. If you're not sure how to get it working services such as Hushmail provide a web mail interface like Hotmail and handle the encryption for you. If your recipient is using a Hushmail account then it's all encrypted and nothing goes across the Internet in the clear.

2. Writing it in an unrecognizable language is fine as long as only you and the intended recipient can understand the language. Encryption is a *lot* easier, unless you're fluent in that language.

3. It's not just your return address that gets left with your email. There's a bunch of footprints that can lead a trail back to your computer. You might want to try using a pair of throwaway hushmail accounts for one off messages instead.

4. I guess that's as straightforward as my responses!

You forgot 5! Don't send sensitive information via e-mail unless you have to. If it's really that sensitive, transfer it in a means that you know is 'secure enough' for the information you want to exchange.

Have you come across some really interesting stuff on the deep web?

There was one story on the web ,which I can never forgot. This story was about a drug.A scientist found a new drug and used it. He fell asleep.The next day when he woke up,he narrated the events he remember.He told his colleagues that when he took that drug,he slept and then woke up lying on a bench and was surrounded by Weird looking creatures,which he described as aliens.These aliens were trying to figure something out with the scientist’s body without touching it.The scientist was scared but couldn't move. Just like everyone else the colleagues believed that it was a dream that the scientist had as resultant of that drug.But the scientist completely deny it to be a dream. The scientist believe that it was too realistic to be a dream and he was literally physically present there at that time.He remembers every detail about that time and also the gestures those aliens made in front of him. He remembers what he was thinking at that time.The scientist somewhat belived that there is a parallel world and that drug was a gateway.Although, I don't believe in stories like this but what if this was true.*goosebumps*After a few days ,I went back to google trying to find that story just to figure out the name of the scientist and the drug,I failed.I hated myself as I had to use 'clear history' very often back then.

How can I write words in Binary?

short answer:
http://www.roubaixinteractive.com/PlayGr...

long answer:
learn how ASCII is used and what hexadecimal and binary number is assigned to each letter, number and punctuation.
you then simply transpose each letter with the binary code. it's a far cry from encryption at the very least, you're only using a simple transposition cipher. however, it is a start if you go down the path to learning data encryption.

here's an example:
capital S is decimal 83, hex 53 and binary 01010011
lowercase n is decimal 110, hex 6e and binary 01101110
lowercase o is decimal 111, hex 6f and binary 01101111
and
lowercase w is decimal 119, hex 77 and binary 01110111

so, if i wanted to write Snow in binary, i'll just write:
01010011011011100110111101110111

TRENDING NEWS