mastodon.world is one of the many independent Mastodon servers you can use to participate in the fediverse.
Generic Mastodon server for anyone to use.

Server stats:

12K
active users

#cryptology

0 posts0 participants0 posts today
Richard<p><a href="https://youtu.be/qO0WvudbO04?si=QIKf4UY8pPCjMoAS" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">youtu.be/qO0WvudbO04?si=QIKf4U</span><span class="invisible">Y8pPCjMoAS</span></a> such an informative video on the possible future of <a href="https://mastodon.social/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a> <a href="https://mastodon.social/tags/deepfakes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>deepfakes</span></a> <a href="https://mastodon.social/tags/photography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>photography</span></a> <a href="https://mastodon.social/tags/adobe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>adobe</span></a> <a href="https://mastodon.social/tags/cryptology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptology</span></a></p>
Erik L. Arneson :emacs:<p>I just added (hopefully) cryptographically secure random number generation to "maybe". Anybody want to review the code? <a href="https://fosstodon.org/tags/maybe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>maybe</span></a> <a href="https://fosstodon.org/tags/GoLang" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GoLang</span></a> <a href="https://fosstodon.org/tags/cryptology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptology</span></a> <a href="https://github.com/pymander/maybe" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/pymander/maybe</span><span class="invisible"></span></a></p>
OCTADETjald Hash and RNG Suite<br><br>A collection of hash and RNG functions that rely on hardware AES instructions.<br><br><a href="https://github.com/NoHatCoder/Tjald-Hash-and-RNG-Suite" rel="nofollow noopener noreferrer" target="_blank">https://github.com/NoHatCoder/Tjald-Hash-and-RNG-Suite</a><br><br>(found via the cryptography mailing list)<br><br><a href="https://soc.octade.net?t=crypto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Crypto</a> <a href="https://soc.octade.net?t=cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Cryptography</a> <a href="https://soc.octade.net?t=cryptology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Cryptology</a> <a href="https://soc.octade.net?t=hashing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Hashing</a> <a href="https://soc.octade.net?t=random" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Random</a> <a href="https://soc.octade.net?t=rng" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#RNG</a><br><br><span class="h-card"><a href="https://a.gup.pe/u/crypto" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@crypto@a.gup.pe</a></span> <span class="h-card"><a href="https://lemmy.ml/c/cryptography" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@cryptography@lemmy.ml</a></span> <span class="h-card"><a href="https://lemmy.world/c/crypto" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@crypto@lemmy.world</a></span><br>
OCTADEI am looking for profiles to follow. Currently I am interested in following users who have an interest in or work in:<br><br><a href="https://soc.octade.net?t=cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Cryptography</a> <a href="https://soc.octade.net?t=cryptology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Cryptology</a> <a href="https://soc.octade.net?t=ciphers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Ciphers</a> <a href="https://soc.octade.net?t=codes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Codes</a> <a href="https://soc.octade.net?t=puzzles" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Puzzles</a> <a href="https://soc.octade.net?t=trapdoormaths" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#TrapDoorMaths</a> <a href="https://soc.octade.net?t=algorithms" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Algorithms</a> <a href="https://soc.octade.net?t=mixnets" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#MixNets</a> <a href="https://soc.octade.net?t=encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Encryption</a> <a href="https://soc.octade.net?t=handciphers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#HandCiphers</a> <a href="https://soc.octade.net?t=fieldciphers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#FieldCiphers</a><br><br>... and arcane math problems or trying to find a way to use them for securing information or messages. Any recommendations will be appreciated.<br><br>I'm looking for interesting new ideas and models from people who like to tinker rather than more rehashed, industry standard cryptography.<br><br><span class="h-card"><a href="https://a.gup.pe/u/crypto" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@crypto@a.gup.pe</a></span> <span class="h-card"><a href="https://mastodon.social/users/patentbuddy" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@patentbuddy@mastodon.social</a></span><br>
OCTADE'period'<br>'cipher period'<br>'periodic range'<br>'periodic limit'<br>'periodicity'<br><br>This is not to be confused with 'cryptoperiod' or 'key period' or 'key time domain' which refers to the time a key is valid.<br><br>The 'period' refers to the length of the cipher stream or generator stream before it repeats from the initial keying or initialization state. Some ciphers may be considered unsafe before reaching this generator period for other reasons, such as mode mixing.<br><br>For example we might say the generator period is 2^155337 which means after generating that much data the stream would cycle back to its initial values. If the amount of data fed into the cipher stream exceeds the period then security is compromised (theoretically, in practice it <i>might</i> be unnoticed by an attacker).<br><br>Last I checked AES has a period of something like 2^39 - 256 for the same key. Your key schedule should be automatically handling that anyway to a much smaller limit.<br><br>The cipher period limitation may be referred to as:<br><br>'maximum safe ciphertext length' or 'maximum safe message size'<br><br><a href="https://soc.octade.net?t=cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#cryptography</a> <a href="https://soc.octade.net?t=cipher" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#cipher</a> <a href="https://soc.octade.net?t=cryptanalysis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#cryptanalysis</a> <a href="https://soc.octade.net?t=cryptology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#cryptology</a> <a href="https://soc.octade.net?t=crypto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#crypto</a> <a href="https://soc.octade.net?t=math" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#math</a> <a href="https://soc.octade.net?t=encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#encryption</a><br>
OCTADECryptologue Arcade - Crypto Darkpaper - Crypto Color Prints - Simplementation Scheme : A Color-Coded Method For Indexing Research and Documentation<br><br><a href="https://doi.org/10.5281/zenodo.13149715" rel="nofollow noopener noreferrer" target="_blank">https://doi.org/10.5281/zenodo.13149715</a><br><br>Crypto Color Prints are a memorable and data-dense documentation paradigm with a color-coded, structural scheme. The scheme separates concerns by color grouping. The scheme forms a simple framework for organizing, referencing, publishing and improving primitives and protocols with a focus on both cooperation and implementation. The Cryptologue scheme is designed for collating descriptions of various components of larger systems into a color-coded reference system.<br><br><a href="https://soc.octade.net?t=publications" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Publications</a> <a href="https://soc.octade.net?t=reference" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Reference</a> <a href="https://soc.octade.net?t=documentation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Documentation</a> <a href="https://soc.octade.net?t=schemes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Schemes</a> <a href="https://soc.octade.net?t=information" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Information</a> <a href="https://soc.octade.net?t=papers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Papers</a> <a href="https://soc.octade.net?t=preprints" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Preprints</a> <a href="https://soc.octade.net?t=cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Cryptography</a> <a href="https://soc.octade.net?t=cryptology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Cryptology</a> <a href="https://soc.octade.net?t=crypto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Crypto</a> <a href="https://soc.octade.net?t=darkpaper" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Darkpaper</a> <a href="https://soc.octade.net?t=zenodo" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Zenodo</a> <a href="https://soc.octade.net?t=octade" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#OCTADE</a><br><br><span class="h-card"><a href="https://a.gup.pe/u/crypto" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@crypto@a.gup.pe</a></span> <span class="h-card"><a href="https://a.gup.pe/u/academicchatter" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@academicchatter@a.gup.pe</a></span> <span class="h-card"><a href="https://a.gup.pe/u/openscience" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@openscience@a.gup.pe</a></span> <span class="h-card"><a href="https://a.gup.pe/u/science" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@science@a.gup.pe</a></span> <span class="h-card"><a href="https://a.gup.pe/u/edutooters" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@edutooters@a.gup.pe</a></span> <span class="h-card"><a href="https://a.gup.pe/u/phdstudents" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@phdstudents@a.gup.pe</a></span> <span class="h-card"><a href="https://a.gup.pe/u/infosec" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@infosec@a.gup.pe</a></span> <span class="h-card"><a href="https://a.gup.pe/u/writing" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@writing@a.gup.pe</a></span> <span class="h-card"><a href="https://a.gup.pe/u/writers" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@writers@a.gup.pe</a></span> <span class="h-card"><a href="https://a.gup.pe/u/infostorm" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@infostorm@a.gup.pe</a></span><br>
:rss: Hacker News<p>National Cryptologic Museum (NSA/CSS) New Temporary Exhibit on Project Stargate<br><a href="https://www.nsa.gov/Press-Room/News-Highlights/Article/Article/3946210/new-exhibits-at-the-national-cryptologic-museum-unlock-your-curiosity/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">nsa.gov/Press-Room/News-Highli</span><span class="invisible">ghts/Article/Article/3946210/new-exhibits-at-the-national-cryptologic-museum-unlock-your-curiosity/</span></a><br><a href="https://rss-mstdn.studiofreesia.com/tags/ycombinator" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ycombinator</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/cryptology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptology</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/foreign_signals_intelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>foreign_signals_intelligence</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/codemaking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>codemaking</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/codebreaking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>codebreaking</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/National_Security_Agency" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>National_Security_Agency</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/NSA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NSA</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/Intelligence_Community" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Intelligence_Community</span></a></p>
Miss Gayle<p>Podcast: <br>Voynich Manuscript<br>A strange medieval document, housed in a stunning modern library, May 16, 2023</p><p>Listen: <a href="https://www.atlasobscura.com/articles/podcast-voynich-manuscript" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">atlasobscura.com/articles/podc</span><span class="invisible">ast-voynich-manuscript</span></a></p><p>The code used in the manuscript has apparently never been deciphered.</p><p>Wiki Article: <a href="https://en.wikipedia.org/wiki/Voynich_manuscript" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">en.wikipedia.org/wiki/Voynich_</span><span class="invisible">manuscript</span></a></p><p><a href="https://urbanists.social/tags/Bookstodon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bookstodon</span></a><br><a href="https://urbanists.social/tags/RareBooks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RareBooks</span></a><br><a href="https://urbanists.social/tags/IlluminatedManuscript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IlluminatedManuscript</span></a><br><a href="https://urbanists.social/tags/Podcast" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Podcast</span></a><br><a href="https://urbanists.social/tags/History" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>History</span></a><br><a href="https://urbanists.social/tags/Linguistics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linguistics</span></a><br><a href="https://urbanists.social/tags/Cryptology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cryptology</span></a></p>
tuxmain<p>Je suis en Master 2 cryptologie et sécurité informatique, et cherche un stage de 4-6 mois début 2025.<br>Domaines : cryptographie, cryptanalyse, sécurité logicielle/réseau. De préférence recherche, R&amp;D, implémentation de protocole, attaque...<br>En France métropolitaine.<br>CV : <a href="https://txmn.tk/cv.pdf" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">txmn.tk/cv.pdf</span><span class="invisible"></span></a></p><p><a href="https://toot.aquilenet.fr/tags/fedihire" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fedihire</span></a> <a href="https://toot.aquilenet.fr/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://toot.aquilenet.fr/tags/crypto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>crypto</span></a> <a href="https://toot.aquilenet.fr/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> <a href="https://toot.aquilenet.fr/tags/cryptology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptology</span></a> <a href="https://toot.aquilenet.fr/tags/rustlang" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rustlang</span></a></p>
h o ʍ l e t t<p>→ How Telegram's Founder Pavel Durov Became a Culture War Martyr<br><a href="https://www.404media.co/how-telegrams-founder-pavel-durov-became-a-culture-war-martyr/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">404media.co/how-telegrams-foun</span><span class="invisible">der-pavel-durov-became-a-culture-war-martyr/</span></a></p><p>Telegram messages are generally not encrypted despite a widespread misconception that could have dramatic consequences for activists/journalists all over the world.</p><p>“It can be simultaneously true that <a href="https://mamot.fr/tags/PavelDurov" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PavelDurov</span></a> has enabled some of the worst things on the <a href="https://mamot.fr/tags/internet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>internet</span></a> via <a href="https://mamot.fr/tags/Telegram" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Telegram</span></a> but that his arrest partially on the grounds of “providing <a href="https://mamot.fr/tags/cryptology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptology</span></a> services” should be more broadly concerning.”</p>
:rss: Hacker News<p>Grace Hopper on Future Possibilities: Data, Hardware, Software, and People<br><a href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3884041/nsa-releases-copy-of-internal-lecture-delivered-by-computing-giant-rear-adm-gra/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">nsa.gov/Press-Room/Press-Relea</span><span class="invisible">ses-Statements/Press-Release-View/Article/3884041/nsa-releases-copy-of-internal-lecture-delivered-by-computing-giant-rear-adm-gra/</span></a><br><a href="https://rss-mstdn.studiofreesia.com/tags/ycombinator" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ycombinator</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/cryptology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptology</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/signals_intelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>signals_intelligence</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Project Gutenberg<p>Agnes Meyer Driscoll, known as "Miss Aggie" or "Madame X'", was born <a href="https://mastodon.social/tags/OTD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OTD</span></a> in 1889.</p><p>She was an American cryptanalyst during both World War I and World War II and was known as "the first lady of naval cryptology." Driscoll played a key role in breaking the Red Book code, a Japanese naval code, in the 1920s. She worked on machine ciphers &amp; contributed to the development of new cryptographic techniques and devices.</p><p><a href="https://en.wikipedia.org/wiki/Agnes_Meyer_Driscoll" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">en.wikipedia.org/wiki/Agnes_Me</span><span class="invisible">yer_Driscoll</span></a></p><p><a href="https://mastodon.social/tags/science" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>science</span></a> <a href="https://mastodon.social/tags/cryptology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptology</span></a> <a href="https://mastodon.social/tags/intelligenceanalysis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>intelligenceanalysis</span></a> <a href="https://mastodon.social/tags/womeninscience" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>womeninscience</span></a></p>
IT News<p>The mythical griffin was not inspired by a horned dinosaur, study concludes - Enlarge / Painting of a gryphon, or griffin, a lion-raptor chimera from... - <a href="https://arstechnica.com/?p=2032976" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arstechnica.com/?p=2032976</span><span class="invisible"></span></a> <a href="https://schleuss.online/tags/mythicalcreatures" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mythicalcreatures</span></a> <a href="https://schleuss.online/tags/paleontology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>paleontology</span></a> <a href="https://schleuss.online/tags/mythbusting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mythbusting</span></a> <a href="https://schleuss.online/tags/cryptology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptology</span></a> <a href="https://schleuss.online/tags/mythology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mythology</span></a> <a href="https://schleuss.online/tags/folklore" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>folklore</span></a> <a href="https://schleuss.online/tags/geomyths" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>geomyths</span></a> <a href="https://schleuss.online/tags/science" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>science</span></a> <a href="https://schleuss.online/tags/gryphon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gryphon</span></a></p>
earthling<p>Code Warriors: NSA's Codebreakers and the Secret Intelligence War Against the Soviet Union by Stephen Budiansky, 2016 </p><p>Stephen Budiansky—a longtime expert in cryptology—tells the fascinating story of how NSA came to be, from its roots in World War II through the fall of the Berlin Wall. Along the way, he guides us through the fascinating challenges faced by cryptanalysts, and how they broke some of the most complicated codes of the 20th c. </p><p><span class="h-card" translate="no"><a href="https://a.gup.pe/u/bookstodon" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>bookstodon</span></a></span> <br><a href="https://mastodon.social/tags/books" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>books</span></a> <br><a href="https://mastodon.social/tags/cryptology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptology</span></a><br><a href="https://mastodon.social/tags/codebreaking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>codebreaking</span></a><br><a href="https://mastodon.social/tags/NSA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NSA</span></a></p>
DrBob, Neurologist, 🧠Mechanic<p>Fascinating Analysis:<br>The Solution of the Zodiac Killer’s 340-Character Cipher<br>The case of the <a href="https://vmst.io/tags/ZodiacKiller" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZodiacKiller</span></a> is one of the most widely known unsolved serial killer cases in history. The unidentified killer murdered five known victims and terrorized the state of California<br>He also communicated extensively with the press and law enforcement. Besides his murders, Zodiac was known for his use of ciphers. The first <a href="https://vmst.io/tags/Zodiac" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Zodiac</span></a> cipher was solved within a week of its publication, while the second cipher was solved after 51 years, when it was discovered to be a transposition and homophonic substitution cipher<br><a href="https://vmst.io/tags/cryptology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptology</span></a><br><a href="https://arxiv.org/pdf/2403.17350.pdf" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arxiv.org/pdf/2403.17350.pdf</span><span class="invisible"></span></a></p>
Mural Hunters - Łowcy MuraliMural by Julian Nowicki in Bydgoszcz (Poland) dedicated to Marian Rejewski, a Polish mathematician and cryptologist who in late 1932 reconstructed the sight-unseen Nazi German military Enigma cipher machine<br> --<br> „Odszyfrowany Rejewski“, czyli mural upamiętniający Mariana Rejewskiego, matematyka i kryptologa, który w 1932 r. złamał szyfr Enigmy, najważniejszej maszyny szyfrującej używanej przez hitlerowskie Niemcy. Wielkoformatowy portret zdobi ścianę kamienicy przy ul. Gdańskiej 10 w Bydgoszczy. Powstał w 2017 r., a zaprojektował go i wykonał Julian Nowicki. Fot. <a class="u-url" href="https://pixelfed.social/@xlenka@pol.social" rel="nofollow noopener noreferrer" target="_blank">@xlenka@pol.social</a><br> <br> <a href="https://pixelfed.social/discover/tags/łowcymurali?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#łowcymurali</a> <a href="https://pixelfed.social/discover/tags/muralhunters?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#muralhunters</a> <a href="https://pixelfed.social/discover/tags/streetart?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#streetart</a> <a href="https://pixelfed.social/discover/tags/urbanart?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#urbanart</a> <a href="https://pixelfed.social/discover/tags/sztukaulicy?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#sztukaulicy</a> <a href="https://pixelfed.social/discover/tags/wallart?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#wallart</a> <a href="https://pixelfed.social/discover/tags/muralart?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#muralart</a> <a href="https://pixelfed.social/discover/tags/mural?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#mural</a> <a href="https://pixelfed.social/discover/tags/murals?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#murals</a> <a href="https://pixelfed.social/discover/tags/streetartpoland?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#streetartpoland</a> <a href="https://pixelfed.social/discover/tags/streetartpolska?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#streetartpolska</a> <a href="https://pixelfed.social/discover/tags/polandstreetart?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#polandstreetart</a> <a href="https://pixelfed.social/discover/tags/polskastreetart?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#polskastreetart</a> <a href="https://pixelfed.social/discover/tags/polska?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#polska</a> <a href="https://pixelfed.social/discover/tags/poland?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#poland</a> <a href="https://pixelfed.social/discover/tags/bydgoszcz?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#bydgoszcz</a>
GrrlScientist ⧖ Ⓥ SciComm<p>Cracking The Silk Dress Cryptogram Hidden In Bennett’s Bronze Bustle </p><p>by <span class="h-card" translate="no"><a href="https://me.dm/@grrlscientist" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>grrlscientist</span></a></span> via <span class="h-card" translate="no"><a href="https://me.dm/@medium" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>medium</span></a></span> </p><p><a href="https://me.dm/tags/cryptogram" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptogram</span></a> <a href="https://me.dm/tags/cryptology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptology</span></a> <a href="https://me.dm/tags/meteorology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>meteorology</span></a> <a href="https://me.dm/tags/weather" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>weather</span></a> forecasting <a href="https://me.dm/tags/USHistory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USHistory</span></a> <a href="https://grrlscientist.medium.com/cracking-the-silk-dress-cryptogram-hidden-in-bennetts-bronze-bustle-402abce9c1e5" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">grrlscientist.medium.com/crack</span><span class="invisible">ing-the-silk-dress-cryptogram-hidden-in-bennetts-bronze-bustle-402abce9c1e5</span></a></p>
IT News<p>Someone finally cracked the “Silk Dress cryptogram” after 10 years - Enlarge / “Paul Ramify loamy event false new event” was one of the line... - <a href="https://arstechnica.com/?p=1997655" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arstechnica.com/?p=1997655</span><span class="invisible"></span></a> <a href="https://schleuss.online/tags/code" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>code</span></a>-breaking <a href="https://schleuss.online/tags/cryptology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptology</span></a> <a href="https://schleuss.online/tags/science" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>science</span></a></p>
スパックマン クリス<p>Remember that 63 digit number my computer is factoring? It is the product of 2 prime numbers.</p><p>Yeah, still factoring. Up to about 26 days. And public key crypto uses numbers several hundred digits long.</p><p>I find it really cool that <a href="https://twit.social/tags/QuantumComputers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>QuantumComputers</span></a> will be able to factor these numbers in practical times. But, I have no idea how or why they are able to do this.</p><p>Can anyone help me on that part?</p><p><a href="https://twit.social/tags/cryptology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptology</span></a> <a href="https://twit.social/tags/cryptanalysis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptanalysis</span></a> <a href="https://twit.social/tags/PublicKeyCrypto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PublicKeyCrypto</span></a></p>
:rss: Hacker News<p>Five Cryptologic Giants to Be Inducted into NSA's Cryptologic Hall of Honor<br><a href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3631341/five-cryptologic-giants-to-be-inducted-into-nsas-cryptologic-hall-of-honor/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">nsa.gov/Press-Room/Press-Relea</span><span class="invisible">ses-Statements/Press-Release-View/Article/3631341/five-cryptologic-giants-to-be-inducted-into-nsas-cryptologic-hall-of-honor/</span></a><br><a href="https://rss-mstdn.studiofreesia.com/tags/ycombinator" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ycombinator</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/cryptology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptology</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/signals_intelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>signals_intelligence</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>