Jump to ContentJump to Main Navigation

You are looking at 1-20 of 35 items

  • Keywords: encryption x
Clear All Modify Search

View:

Closing Remarks

Keith M. Martin

in Everyday Cryptography: Fundamental Principles and Applications

Published in print:
2012
Published Online:
December 2013
ISBN:
9780199695591
eISBN:
9780191774898
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/acprof:oso/9780199695591.003.0013
Subject:
Mathematics, Applied Mathematics

This chapter presents some important lessons about cryptography. Among these are that cryptography is much more than encryption; cryptography is an everyday technology; cryptography is a process; ... More


Symmetric Encryption

Keith M. Martin

in Everyday Cryptography: Fundamental Principles and Applications

Published in print:
2012
Published Online:
December 2013
ISBN:
9780199695591
eISBN:
9780191774898
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/acprof:oso/9780199695591.003.0004
Subject:
Mathematics, Applied Mathematics

This chapter discusses symmetric encryption algorithms. It first describes the two major classes of symmetric encryption algorithm, stream ciphers and block ciphers. Simple stream ciphers are fast ... More


Politics Under Erasure: Regionalism as Cryptology

Mark Franko

in Martha Graham in Love and War: The Life in the Work

Published in print:
2012
Published Online:
September 2012
ISBN:
9780199777662
eISBN:
9780199950119
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/acprof:oso/9780199777662.003.0002
Subject:
Music, Dance, History, American

This chapter analyzes Graham’s Appalachian Spring (1944) as a work that encrypts its popular front critique of American history through revisions of the scenarios Graham wrote for Aaron Copland and ... More


Monkeys with World-Spanning Voices

Peter J. Bentley

in Digitized: The science of computers and how it shapes our world

Published in print:
2012
Published Online:
November 2020
ISBN:
9780199693795
eISBN:
9780191918421
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/oso/9780199693795.003.0009
Subject:
Computer Science, History of Computer Science

The howler monkey is one of the loudest animals in the world. Its haunting calls can be heard several miles away in dense forest. Today, with the help of the computer, ... More


Everyday Cryptography: Fundamental Principles and Applications

Keith Martin

Published in print:
2017
Published Online:
July 2017
ISBN:
9780198788003
eISBN:
9780191829956
Item type:
book
Publisher:
Oxford University Press
DOI:
10.1093/oso/9780198788003.001.0001
Subject:
Mathematics, Computational Mathematics / Optimization, Logic / Computer Science / Mathematical Philosophy

Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing ... More


Encrypting the Past: The German-Jewish Holocaust novel of the first generation

Kirstin Gwyer

Published in print:
2014
Published Online:
October 2014
ISBN:
9780198709930
eISBN:
9780191780202
Item type:
book
Publisher:
Oxford University Press
DOI:
10.1093/acprof:oso/9780198709930.001.0001
Subject:
Literature, 20th-century and Contemporary Literature, European Literature

Encrypting the Past puts forward the interpretative category of the first-generation German-Jewish Holocaust novel and examines its representational strategies. With reference to works by H. G. ... More


Cryptic Crossing

William Robert

in Trials: Of Antigone and Jesus

Published in print:
2009
Published Online:
March 2011
ISBN:
9780823231652
eISBN:
9780823237203
Item type:
chapter
Publisher:
Fordham University Press
DOI:
10.5422/fso/9780823231652.003.0005
Subject:
Religion, Philosophy of Religion

Antigone and Jesus cross in the tomb. They cross corporeally, their bodies encrypted in graves. They cross in their tombs' thresholds, separating life and death, for whereas Antigone is buried alive, ... More


From Hut 8 to the Newmanry

Irving John ( Jack) Good

in Colossus: The secrets of Bletchley Park's code-breaking computers

Published in print:
2006
Published Online:
November 2020
ISBN:
9780192840554
eISBN:
9780191917936
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/oso/9780192840554.003.0025
Subject:
Computer Science, History of Computer Science

During the Second World War the Germans used two kinds of high-grade cryptographic system: Enigma, and what we called ‘Fish’. There were two forms of Fish. ... More


Cryptography for Personal Devices

Keith M. Martin

in Everyday Cryptography: Fundamental Principles and Applications

Published in print:
2017
Published Online:
July 2017
ISBN:
9780198788003
eISBN:
9780191829956
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/oso/9780198788003.003.0013
Subject:
Mathematics, Computational Mathematics / Optimization, Logic / Computer Science / Mathematical Philosophy

In this chapter, we consider some of the cryptography which can be used to protect data stored on personal devices. We begin by looking at various forms of cryptographic file protection, including ... More


The Enigma machine

Joel Greenberg

in The Turing Guide

Published in print:
2017
Published Online:
November 2020
ISBN:
9780198747826
eISBN:
9780191916946
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/oso/9780198747826.003.0018
Subject:
Computer Science, History of Computer Science

Shortly after the end of the First World War, the German Navy learned that its encrypted communications had been read throughout the hostilities by both ... More


Breaking machines with a pencil

Mavis Batey

in The Turing Guide

Published in print:
2017
Published Online:
November 2020
ISBN:
9780198747826
eISBN:
9780191916946
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/oso/9780198747826.003.0019
Subject:
Computer Science, History of Computer Science

Dilly Knox, the renowned First World War codebreaker, was the first to investigate the workings of the Enigma machine after it came on the market in 1925, ... More


Public-Key Encryption

Keith M. Martin

in Everyday Cryptography: Fundamental Principles and Applications

Published in print:
2017
Published Online:
July 2017
ISBN:
9780198788003
eISBN:
9780191829956
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/oso/9780198788003.003.0005
Subject:
Mathematics, Computational Mathematics / Optimization, Logic / Computer Science / Mathematical Philosophy

In this chapter, we introduce public-key encryption. We first consider the motivation behind the concept of public-key cryptography and introduce the hard problems on which popular public-key ... More


National, Private Sector, and Technological Approaches

Christopher Kuner

in Transborder Data Flows and Data Privacy Law

Published in print:
2013
Published Online:
September 2013
ISBN:
9780199674619
eISBN:
9780191758898
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/acprof:oso/9780199674619.003.0004
Subject:
Law, Intellectual Property, IT, and Media Law

Since the 1970s, over seventy countries in all regions of the world have enacted national data protection and privacy laws regulating transborder data flows, which is largely based on the various ... More


Control, Security, and Risk in the Cloud

W Kuan Hon and Christopher Millard

in Cloud Computing Law

Published in print:
2013
Published Online:
January 2014
ISBN:
9780199671670
eISBN:
9780191767463
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/acprof:oso/9780199671670.003.0002
Subject:
Law, Intellectual Property, IT, and Media Law

The focus of this chapter is on control, security and risk in the cloud, including a description of how the so-called ‘CIA Triad’ (Confidentiality, Integrity and Availability) works in cloud ... More


What is Regulated as Personal Data in Clouds?

W Kuan Hon, Christopher Millard, and Ian Walden

in Cloud Computing Law

Published in print:
2013
Published Online:
January 2014
ISBN:
9780199671670
eISBN:
9780191767463
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/acprof:oso/9780199671670.003.0007
Subject:
Law, Intellectual Property, IT, and Media Law

This chapter considers what information in clouds is, and what should be, classified as personal data under European Union data protection laws. It is crucial to tackle this question first as the ... More


Secrets

Lance Fortnow

in The Golden Ticket: P, NP, and the Search for the Impossible

Published in print:
2017
Published Online:
May 2018
ISBN:
9780691175782
eISBN:
9781400846610
Item type:
chapter
Publisher:
Princeton University Press
DOI:
10.23943/princeton/9780691175782.003.0008
Subject:
Computer Science, Programming Languages

This chapter analyzes how, in 1976, Whitfield Diffie and Martin Hellman suggested that one could use NP to hide one's own secrets. The field of cryptography, the study of secret messages, changed ... More


Public-Key Encryption

Keith M. Martin

in Everyday Cryptography: Fundamental Principles and Applications

Published in print:
2012
Published Online:
December 2013
ISBN:
9780199695591
eISBN:
9780191774898
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/acprof:oso/9780199695591.003.0005
Subject:
Mathematics, Applied Mathematics

This chapter discusses public-key encryption. It first explains the motivation for public-key encryption and identifies some of the problems that need to be solved before it can be used effectively. ... More


Reclaiming Technology: From Information Theory to Statistical Form

Jennifer Iverson

in Electronic Inspirations: Technologies of the Cold War Musical Avant-Garde

Published in print:
2019
Published Online:
January 2019
ISBN:
9780190868192
eISBN:
9780190929138
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/oso/9780190868192.003.0005
Subject:
Music, History, Western

In the transition from World War II to the Cold War, military innovations were domesticated and repurposed for civilian, scientific, and cultural advancement. Information theory is one such ... More


Encryption as a Human Right

David Casacuberta and Adolfo Plasencia

in Is the Universe a Hologram?: Scientists Answer the Most Provocative Questions

Published in print:
2017
Published Online:
January 2018
ISBN:
9780262036016
eISBN:
9780262339308
Item type:
chapter
Publisher:
The MIT Press
DOI:
10.7551/mitpress/9780262036016.003.0020
Subject:
Society and Culture, Technology and Society

In this dialogue, the philosopher David Casacuberta starts out by reflecting on how, with the advent of digital technologies, people’s rights are threatened by new problems that require new ... More


NASA’s Applications Satellites and National Security Requirements

James E. David

in Spies and Shuttles: NASA's Secret Relationships with the DoD and CIA

Published in print:
2015
Published Online:
May 2015
ISBN:
9780813049991
eISBN:
9780813050430
Item type:
chapter
Publisher:
University Press of Florida
DOI:
10.5744/florida/9780813049991.003.0009
Subject:
History, American History: 20th Century

With their increasingly sophisticated instruments and ability to collect more data, NASA's application satellites in the Shuttle era helped meet national security requirements. Landsat imagery ... More


View: