By: David McDonald. Why codes are important? We intend to begin on the first of February...

12
THE IMPORTANCE OF CRYPTOLOGY AND CODE- BREAKING ON MODERN LANGUAGE AND PRIVACY By: David McDonald

Transcript of By: David McDonald. Why codes are important? We intend to begin on the first of February...

Page 1: By: David McDonald. Why codes are important? We intend to begin on the first of February unrestricted submarine warfare. We shall endeavor in spite of.

THE IMPORTANCE OF CRYPTOLOGY AND CODE-BREAKING ON MODERN LANGUAGE AND PRIVACY

By: David McDonald

Page 2: By: David McDonald. Why codes are important? We intend to begin on the first of February unrestricted submarine warfare. We shall endeavor in spite of.

Why codes are important?

We intend to begin on the first of February unrestricted submarine warfare. We shall endeavor in spite of this to keep the United States of America neutral. In the event of this not succeeding, we make Mexico a proposal of alliance on the following basis: we make war together, make peace together, generous financial support and an understanding on our part that Mexico is to reconquer the lost territory in Texas, New Mexico, and Arizona.

Page 3: By: David McDonald. Why codes are important? We intend to begin on the first of February unrestricted submarine warfare. We shall endeavor in spite of.

Knowledge Issues

How does one keep important messages secret in a time when all languages are public?

How important is secrecy when it comes to language?

To what extent is secrecy important in a time when anyone can find anything by doing a simple web search?

How can people dictate what others see through the use of codes?

Page 4: By: David McDonald. Why codes are important? We intend to begin on the first of February unrestricted submarine warfare. We shall endeavor in spite of.
Page 5: By: David McDonald. Why codes are important? We intend to begin on the first of February unrestricted submarine warfare. We shall endeavor in spite of.

Privacy Imagine this…

Page 6: By: David McDonald. Why codes are important? We intend to begin on the first of February unrestricted submarine warfare. We shall endeavor in spite of.

Perfect Secrecy

How would you win the game? - the locks are a decoy - don’t put your card in the box - place the card back in the deck - shuffle Why does this work? - it’s all about the patterns > just like decrypting codes > codes have patterns

Page 7: By: David McDonald. Why codes are important? We intend to begin on the first of February unrestricted submarine warfare. We shall endeavor in spite of.
Page 8: By: David McDonald. Why codes are important? We intend to begin on the first of February unrestricted submarine warfare. We shall endeavor in spite of.

Meet me at Scorpion Ridge.

Page 9: By: David McDonald. Why codes are important? We intend to begin on the first of February unrestricted submarine warfare. We shall endeavor in spite of.

Theory of Knowledge

How do people dictate what others see?

- how can the encryption of codes be an example of this?

How is the age of public information making it harder for people to communicate in private?

To what extent would it be possible to communicate privately through sites like Twitter or Facebook?

Page 10: By: David McDonald. Why codes are important? We intend to begin on the first of February unrestricted submarine warfare. We shall endeavor in spite of.

Codes in the Digital Age

Page 11: By: David McDonald. Why codes are important? We intend to begin on the first of February unrestricted submarine warfare. We shall endeavor in spite of.

Implications of Knowledge:What to leave here with… Could a trivial message be seen as

important when encrypted? How do we go about making things private

in such a public world? Has the world’s information become so

public, that there is no way of keeping it secret?

What is the importance and the implications of keeping language, communication, and messages private on a domestic, national, and international level?

Page 12: By: David McDonald. Why codes are important? We intend to begin on the first of February unrestricted submarine warfare. We shall endeavor in spite of.

Works Cited

Code Makers & Code Breakers, Cryptologoy (2/3). History Channel, n.d. Documentary.Youtube. History Channel, 11 June 2011. Web. 22 Apr. 2013. <http://www.youtube.com/watch?v=wStSsqR3Q5Y>.

Lindsay, James M. "Council on Foreign Relations." The Water's Edge. Council on Foreign Relations, 1 Mar. 2011. Web. 23 Apr. 2013. <http://blogs.cfr.org/lindsay/2011/03/01/twe-remembers-the-zimmermann-telegram/>.

"Perfect Secrecy | Journey into Cryptography |Khan Academy." Khan Academy. Khan Academy, n.d. Web. 26 Apr. 2013. <https://www.khanacademy.org/math/applied-math/cryptography/crypt/v/perfect-secrecy>.

"Polyalphabetic Cipher | Journey into Cryptography |Khan Academy." Khan Academy. Khan Academy, n.d. Web. 26 Apr. 2013. <https://www.khanacademy.org/math/applied-math/cryptography/crypt/v/polyalphabetic-cipher>.

Vacca, John R. "Public Key Infrastructures (PKIS): What Are They?" Public Key Infrastructure: Building Trusted Applications and Web Services. United States: Auerbach, 2004. 7-9. Google Books. Google, 2004. Web. 25 Apr. 2013. <http://books.google.com/books?id=3kS8XDALWWYC&pg=PA8#v=onepage&q&f=false>.