#encryption and decryption
Explore tagged Tumblr posts
el-ffej · 10 months ago
Text
This is a great book -- I've read it twice, and it is both entertaining and extremely good at explaining how ciphers work (this is not easy).
Moreover, it's a history of how secret codes have worked through the ages; the context is (to me) the most enjoyable part of the book to me. Even if I wasn't interested in how encryption and decryption work at all, the stories of how they were developed would carry my interest alone.
Highly recommended!
Years and years ago, I read a book on cryptography that I picked up because it looked interesting--and it was!
But there was a side anecdote in there that stayed with me for more general purposes.
The author was describing a cryptography class that they had taken back in college where the professor was demonstrating the process of "reversibility", which is a principle that most codes depend on. Specifically, it should be easy to encode, and very hard to decode without the key--it is hard to reverse the process.
So he had an example code that he used for his class to demonstrate this, a variation on the Book Code, where the encoded text would be a series of phone numbers.
The key to the code was that phone books are sorted alphabetically, so you could encode the text easily--picking phone numbers from the appropriate alphabetical sections to use ahead of time would be easy. But since phone books were sorted alphabetically, not numerically, it would be nearly impossible to reverse the code without exhaustively searching the phone book for each string of numbers and seeing what name it was tied to.
Nowadays, defeating this would be child's play, given computerized databases, but back in the 80s and 90s, this would have been a good code... at least, until one of the students raised their hand and asked, "Why not just call the phone numbers and ask who lives there?"
The professor apparently was dumbfounded.
He had never considered that question. As a result, his cipher, which seemed to be nearly unbreakable to him, had such an obvious flaw, because he was the sort of person who could never coldcall someone to ask that sort of thing!
In the crypto book, the author went on to use this story as an example of why security systems should not be tested by the designer (because of course the security system is ready for everything they thought of, by definition), but for me, as a writer, it stuck with me for a different reason.
It's worth talking out your story plot with other people just to see if there's a "Why not just call the phone numbers?" obvious plot hole that you've missed, because of your singular perspective as a person. Especially if you're writing the sort of plot where you have people trying to outsmart each other.
47K notes · View notes
thelawfulchaotic · 1 year ago
Text
Tumblr media
In an alphabet I made for a dnd game.
This corresponds to English. There are more than 26 letters but not many more than 26. No numbers appear in this text.
I’m honestly not sure how possible it is to decrypt without a partial key. But I’m willing to post additional text, draw anything ambiguous on a grid, etc.
38 notes · View notes
pickledmelon · 7 months ago
Text
Fpm'y ary zr noyr ypp jstf, upit nappf od ypp ysdyu smf o epm'y ary hp yoaa o drr npmr ! :3 <3
2 notes · View notes
lightblueminecraftorchid · 11 months ago
Text
I’m like if a girl had OneHalf installed on her Master Boot Record..
3 notes · View notes
innocentsardonicpotatoes · 8 months ago
Text
My feelings are encrypted in my head but he knows how to decrypt them, put them in words and make it easy for me to understand myself.
Tumblr media
1 note · View note
onvochn · 2 years ago
Text
HAH
Tumblr media
HAHAHAHA I AM VICTORIOUS, GOT THE LINKLE MOD WORKING ON ACTUAL HARDWARE
6 notes · View notes
Text
youtube
What is artificial intelligence, and how did artificial intelligence evolve? From Perceptron to Evolutionary Intelligence. A story of 100 years of development in AI.
4 notes · View notes
chrysaetos-iii · 2 years ago
Text
Heart Kept Deep In Secrecy Will Self-Destruct When Exposed
4 notes · View notes
theres-whump-in-that-nebula · 10 months ago
Text
I should watch Only Lovers Left Alive tonight
0 notes
mustafabukulmez-blog · 11 months ago
Text
PHP OpenSSL Encrypt & Decrypt
Merhabalar, bu yazımda PHP OpenSSL Encrypt & Decrypt konusuna değineceğim. Daha önceleri Encrypt & Decrypt konusunda bir yazı daha yazmıştım. Her ne kadar konu olarak aynı olsa da yöntem olarak farklı oldukları için yeni bir yazı olarak yazıyorum. Üstelik şifreleme üzerinde farklı programlama dillerine dair bir çok yazım var. Hepsini hemen aşağıya ekliyorum.   PHP MD5 Şifreleme Kullanımı C#…
Tumblr media
View On WordPress
0 notes
infosectrain03 · 11 months ago
Text
Cryptography is a method used to secure communication and information between two parties by encrypting it using keys so that only the sender and intended receiver can read and comprehend the message. This ensures the confidentiality, integrity, and security of digital data from unauthorized users, often known as adversaries.
0 notes
merchantservices444 · 1 year ago
Text
Safeguarding Success: The Crucial Role of Data Protection in E-Commerce Business
1 note · View note
megabuild · 3 months ago
Text
so people may have seen martyn's recent post about hints for the next life series
Tumblr media
which people are obviously looking for clues in. at first glance it appears to just be a normal post but if you look closely there's actually a hidden meaning! if you take the first letter of the rhyming words (eg. (S)lither-(S)lice-(H)int-(P)rice-and so on) you'll get the mess "sshprwvsflfmsstm".
seems innocuous enough, right? but actually, this is part of a vigenère cipher- a type of cipher where the meaning is encrypted using a key word. the key word for this one i figured was 'not' since it's repeated throughout. and when you put that through a decrypting program using that keyword, the results are fascinating:
Tumblr media
that's right- it doesn't fucking mean anything
3K notes · View notes
digitalartform · 1 year ago
Text
Playing around with simple encryption and decryption using blend modes.
0 notes
aphisit0 · 1 year ago
Text
AI: A New Hope for the Visually Impaired
View On WordPress
1 note · View note
codewithmurad · 1 year ago
Text
Tumblr media
Desktop Based Java Project using AES Algorithm | Text & Image Encryption Decryption using AES
The Project is basically 1 module project i.e Admin. So before Encrypting and Decrypting any Text or File Admin have Login into the System by entering the correct credential. Before login he has to register, below is a Register form After Login, there are two important functionalities that we have added to this project. The first one is Text Encryption & Decryption and the second one is Image Encryption & Decryption or File Encryption & Decryption.
0 notes