Topic: Cryptography/Computer science (Page 5)
You are looking at all articles with the topic "Cryptography/Computer science". We found 49 matches.
Hint:
To view all topics, click here. Too see the most popular topics, click here instead.
π W. T. Tutte - mathematician and code breaker
William Thomas "Bill" Tutte OC FRS FRSC (; 14 May 1917 β 2 May 2002) was a British codebreaker and mathematician. During the Second World War, he made a brilliant and fundamental advance in cryptanalysis of the Lorenz cipher, a major Nazi German cipher system which was used for top-secret communications within the Wehrmacht High Command. The high-level, strategic nature of the intelligence obtained from Tutte's crucial breakthrough, in the bulk decrypting of Lorenz-enciphered messages specifically, contributed greatly, and perhaps even decisively, to the defeat of Nazi Germany. He also had a number of significant mathematical accomplishments, including foundation work in the fields of graph theory and matroid theory.
Tutte's research in the field of graph theory proved to be of remarkable importance. At a time when graph theory was still a primitive subject, Tutte commenced the study of matroids and developed them into a theory by expanding from the work that Hassler Whitney had first developed around the mid 1930s. Even though Tutte's contributions to graph theory have been influential to modern graph theory and many of his theorems have been used to keep making advances in the field, most of his terminology was not in agreement with their conventional usage and thus his terminology is not used by graph theorists today. "Tutte advanced graph theory from a subject with one text (D. KΕnig's) toward its present extremely active state."
Discussed on
- "W. T. Tutte - mathematician and code breaker" | 2013-05-28 | 27 Upvotes 2 Comments
π Differential Power Analysis
In cryptography, power analysis is a form of side channel attack in which the attacker studies the power consumption of a cryptographic hardware device (such as a smart card, tamper-resistant "black box", or integrated circuit). The attack can non-invasively extract cryptographic keys and other secret information from the device.
Simple power analysis (SPA) involves visually interpreting power traces, or graphs of electrical activity over time. Differential power analysis (DPA) is a more advanced form of power analysis, which can allow an attacker to compute the intermediate values within cryptographic computations through statistical analysis of data collected from multiple cryptographic operations. SPA and DPA were introduced to the open cryptology community in 1998 by Paul Kocher, Joshua Jaffe and Benjamin Jun.
π BB84 β A quantum key distribution scheme
BB84 is a quantum key distribution scheme developed by Charles Bennett and Gilles Brassard in 1984. It is the first quantum cryptography protocol. The protocol is provably secure, relying on the quantum property that information gain is only possible at the expense of disturbing the signal if the two states one is trying to distinguish are not orthogonal (see no-cloning theorem) and an authenticated public classical channel. It is usually explained as a method of securely communicating a private key from one party to another for use in one-time pad encryption.
Discussed on
- "BB84 β A quantum key distribution scheme" | 2015-04-18 | 12 Upvotes 6 Comments
π Bitcoin Cryptocurrency
Bitcoin (βΏ) is a cryptocurrency. It is a decentralized digital currency without a central bank or single administrator that can be sent from user to user on the peer-to-peer bitcoin network without the need for intermediaries.
Transactions are verified by network nodes through cryptography and recorded in a public distributed ledger called a blockchain. Bitcoin was invented in 2008 by an unknown person or group of people using the name Satoshi Nakamoto and started in 2009 when its source code was released as open-source software. Bitcoins are created as a reward for a process known as mining. They can be exchanged for other currencies, products, and services. Research produced by University of Cambridge estimates that in 2017, there were 2.9 to 5.8 million unique users using a cryptocurrency wallet, most of them using bitcoin.
Bitcoin has been criticized for its use in illegal transactions, its high electricity consumption, price volatility, and thefts from exchanges. Some economists, including several Nobel laureates, have characterized it as a speculative bubble. Bitcoin has also been used as an investment, although several regulatory agencies have issued investor alerts about bitcoin.
π TWINKLE is a hypothetical integer factorization device circa 1999 by Adi Shamir
TWINKLE (The Weizmann Institute Key Locating Engine) is a hypothetical integer factorization device described in 1999 by Adi Shamir and purported to be capable of factoring 512-bit integers. It is also a pun on the twinkling LEDs used in the device. Shamir estimated that the cost of TWINKLE could be as low as $5000 per unit with bulk production. TWINKLE has a successor named TWIRL which is more efficient.
Discussed on
- "TWINKLE is a hypothetical integer factorization device circa 1999 by Adi Shamir" | 2016-10-31 | 12 Upvotes 5 Comments
π Dogecoin
Dogecoin ( DOHJ-koyn, code: DOGE, symbol: Γ) is a cryptocurrency featuring a likeness of the Shiba Inu dog from the "Doge" Internet meme as its logo. Introduced as a "joke currency" on 6 December 2013, Dogecoin quickly developed its own online community and reached a capitalization of US$60 million in January 2014.
Compared with other cryptocurrencies, Dogecoin had a fast initial coin production schedule: 100 billion coins were in circulation by mid-2015, with an additional 5.256 billion coins every year thereafter. As of 30Β JuneΒ 2015, the 100 billionth Dogecoin had been mined. While there are few mainstream commercial applications, the currency has gained traction as an Internet tipping system, in which social media users grant Dogecoin tips to other users for providing interesting or noteworthy content. Dogecoin is referred to as an altcoin.
Discussed on
- "Dogecoin" | 2013-12-14 | 11 Upvotes 4 Comments
π Cypherpunk
A cypherpunk is any individual advocating widespread use of strong cryptography and privacy-enhancing technologies as a route to social and political change. Originally communicating through the Cypherpunks electronic mailing list, informal groups aimed to achieve privacy and security through proactive use of cryptography. Cypherpunks have been engaged in an active movement since at least the late 1980s.
Discussed on
- "Cypherpunk" | 2023-06-08 | 11 Upvotes 1 Comments
π Hashcash
Hashcash is a proof-of-work system used to limit email spam and denial-of-service attacks, and more recently has become known for its use in bitcoin (and other cryptocurrencies) as part of the mining algorithm. Hashcash was proposed in 1997 by Adam Back and described more formally in Back's 2002 paper "Hashcash - A Denial of Service Counter-Measure".
π Link 16
Link 16 is a military tactical data link network used by NATO and nations allowed by the MIDS International Program Office (IPO). Its specification is part of the family of Tactical Data Links.
With Link 16, military aircraft as well as ships and ground forces may exchange their tactical picture in near-real time. Link 16 also supports the exchange of text messages, imagery data and provides two channels of digital voice (2.4Β kbit/s or 16Β kbit/s in any combination). Link 16 is defined as one of the digital services of the JTIDS / MIDS in NATO's Standardization Agreement STANAG 5516. MIL-STD-6016 is the related United States Department of Defense Link 16 MIL-STD.