#encryption and decryption
Explore tagged Tumblr posts
Text
This is a great book -- I've read it twice, and it is both entertaining and extremely good at explaining how ciphers work (this is not easy).
Moreover, it's a history of how secret codes have worked through the ages; the context is (to me) the most enjoyable part of the book to me. Even if I wasn't interested in how encryption and decryption work at all, the stories of how they were developed would carry my interest alone.
Highly recommended!
Years and years ago, I read a book on cryptography that I picked up because it looked interesting--and it was!
But there was a side anecdote in there that stayed with me for more general purposes.
The author was describing a cryptography class that they had taken back in college where the professor was demonstrating the process of "reversibility", which is a principle that most codes depend on. Specifically, it should be easy to encode, and very hard to decode without the key--it is hard to reverse the process.
So he had an example code that he used for his class to demonstrate this, a variation on the Book Code, where the encoded text would be a series of phone numbers.
The key to the code was that phone books are sorted alphabetically, so you could encode the text easily--picking phone numbers from the appropriate alphabetical sections to use ahead of time would be easy. But since phone books were sorted alphabetically, not numerically, it would be nearly impossible to reverse the code without exhaustively searching the phone book for each string of numbers and seeing what name it was tied to.
Nowadays, defeating this would be child's play, given computerized databases, but back in the 80s and 90s, this would have been a good code... at least, until one of the students raised their hand and asked, "Why not just call the phone numbers and ask who lives there?"
The professor apparently was dumbfounded.
He had never considered that question. As a result, his cipher, which seemed to be nearly unbreakable to him, had such an obvious flaw, because he was the sort of person who could never coldcall someone to ask that sort of thing!
In the crypto book, the author went on to use this story as an example of why security systems should not be tested by the designer (because of course the security system is ready for everything they thought of, by definition), but for me, as a writer, it stuck with me for a different reason.
It's worth talking out your story plot with other people just to see if there's a "Why not just call the phone numbers?" obvious plot hole that you've missed, because of your singular perspective as a person. Especially if you're writing the sort of plot where you have people trying to outsmart each other.
#the code book#simon singh#highly recommended#ciphers#secret code#encryption and decryption#encryption#history of encryption#history of ciphers
47K notes
·
View notes
Text
In an alphabet I made for a dnd game.
This corresponds to English. There are more than 26 letters but not many more than 26. No numbers appear in this text.
I’m honestly not sure how possible it is to decrypt without a partial key. But I’m willing to post additional text, draw anything ambiguous on a grid, etc.
38 notes
·
View notes
Text
Fpm'y ary zr noyr ypp jstf, upit nappf od ypp ysdyu smf o epm'y ary hp yoaa o drr npmr ! :3 <3
2 notes
·
View notes
Text
I’m like if a girl had OneHalf installed on her Master Boot Record..
#blue chatter#Functionally very similar but Something’s going on in there that u can’t see#OneHalf is a computer virus which infected .exe files of MS-DOS computers#It wrote a decryption key to the master boot record#as well as instructions to encrypt the last two unencrypted sectors of the hard disk upon startup#it was found in the wild in 1994#removing OneHalf without a specialized tool completely bricked your computer depending on how long you had it#bc if you attempted to install a clean copy of the MBR without carefully decrypting your encrypted data first#there’d be no way to unencrypt your files and you’d be screwed
3 notes
·
View notes
Text
My feelings are encrypted in my head but he knows how to decrypt them, put them in words and make it easy for me to understand myself.
1 note
·
View note
Text
HAH
HAHAHAHA I AM VICTORIOUS, GOT THE LINKLE MOD WORKING ON ACTUAL HARDWARE
#it was a pain in the ass figuring out what went wrong the first few times#i think the files ended up corrupted during the decryption and re-encryption most likely#BUT I WIN#BRIAR WINS IN THE END#HAHA
6 notes
·
View notes
Text
youtube
What is artificial intelligence, and how did artificial intelligence evolve? From Perceptron to Evolutionary Intelligence. A story of 100 years of development in AI.
#artificialintelligence#machinelearning#ai#chatgpt#artificialgeneralintelligence#computer#computervision#educationalresources#digitalliteracy#turingstory#alanturing#turingtest#artifical#intelligence#computing#encryption#decrypt#Youtube
4 notes
·
View notes
Text
Heart Kept Deep In Secrecy Will Self-Destruct When Exposed
4 notes
·
View notes
Text
I should watch Only Lovers Left Alive tonight
#John Hurt and vampires; can’t get better than that right?#That is… basically what I’m writing right now lol (the John Hurt part is very subtle though… it’s more sneaky references than anything)#TTTLTEL#I want to write a song entirely comprised of references to every John Hurt media ever in chronological order#with lyrics that sound like complete gibberish if you don’t know what I’m talking about#Most of my songs sound like complete gibberish actually#I like confusing and worrying people#“Peanut butter fish sticks ham and eggs for breakfast” is an actual line of a song I wrote/am writing#It sounds funny but is actually extremely disgusting if you read too far into it#I’ve been told my encryption methods and conlangs make me seem mentally unwell#on account of them looking like the most tossed word salad ever#That’s how I know I’m doing it right#Because if people assume it’s nonsense then they won’t try to decrypt it#kao pe’voori bama crying cockadoodledoo ir monster señior consonant [arts and crafts channel] message
0 notes
Text
PHP OpenSSL Encrypt & Decrypt
Merhabalar, bu yazımda PHP OpenSSL Encrypt & Decrypt konusuna değineceğim. Daha önceleri Encrypt & Decrypt konusunda bir yazı daha yazmıştım. Her ne kadar konu olarak aynı olsa da yöntem olarak farklı oldukları için yeni bir yazı olarak yazıyorum. Üstelik şifreleme üzerinde farklı programlama dillerine dair bir çok yazım var. Hepsini hemen aşağıya ekliyorum. PHP MD5 Şifreleme Kullanımı C#…
View On WordPress
0 notes
Text
Cryptography is a method used to secure communication and information between two parties by encrypting it using keys so that only the sender and intended receiver can read and comprehend the message. This ensures the confidentiality, integrity, and security of digital data from unauthorized users, often known as adversaries.
0 notes
Text
Safeguarding Success: The Crucial Role of Data Protection in E-Commerce Business
#Safeguarding Success: The Crucial Role of Data Protection in E-Commerce Business#starting your business on the right side of the law#what is the use of firewall in a computer#computers privacy & data protection#business#e-commerce#need of encryption and decryption in cryptography#small business credit card processing#starting a business legally#data protection and artificial intelligence#ecommerce success#business communication#the power of personalization: unlocking e-commerce success (free planning kit)
1 note
·
View note
Text
so people may have seen martyn's recent post about hints for the next life series
which people are obviously looking for clues in. at first glance it appears to just be a normal post but if you look closely there's actually a hidden meaning! if you take the first letter of the rhyming words (eg. (S)lither-(S)lice-(H)int-(P)rice-and so on) you'll get the mess "sshprwvsflfmsstm".
seems innocuous enough, right? but actually, this is part of a vigenère cipher- a type of cipher where the meaning is encrypted using a key word. the key word for this one i figured was 'not' since it's repeated throughout. and when you put that through a decrypting program using that keyword, the results are fascinating:
that's right- it doesn't fucking mean anything
3K notes
·
View notes
Text
Playing around with simple encryption and decryption using blend modes.
0 notes
Text
AI: A New Hope for the Visually Impaired
View On WordPress
#"เคล็ดลับการเล่นเกม#"Progress Knight:#.apk#2023#AI Web Summarizer#ทวิตล่ม#แชท gpt#blind#Commentary Screenreader#computer#download#🔴 Liv#Encrypt Decrypt#face book#Fault Zone#game store#games#Google Play Store Play Store#GoogleAI#installing Google Chrome on Mac OS.#jook#LibreTube#Life Simulator 3#LIMITED TWEET#Lucky Patcher#mod#mp3#music#music AI#NoGraphicRPG
1 note
·
View note
Text
Desktop Based Java Project using AES Algorithm | Text & Image Encryption Decryption using AES
The Project is basically 1 module project i.e Admin. So before Encrypting and Decrypting any Text or File Admin have Login into the System by entering the correct credential. Before login he has to register, below is a Register form After Login, there are two important functionalities that we have added to this project. The first one is Text Encryption & Decryption and the second one is Image Encryption & Decryption or File Encryption & Decryption.
#Desktop Based Java Project using AES Algorithm#Desktop Based Java Project#Desktop Based Java Project by AES#Text & Image Encryption Decryption using AES#Collage students projects.
0 notes