Αγορά Πολιτών

Τρόπος Συμμετοχής

Χορηγίες

Πολίτες στην Αγορά

Έχουμε 205 επισκέπτες συνδεδεμένους

Επικοινωνία

Location: Northern Germany

+4917667046073

Citizen Band Radio:

- Channels: 11-19 AM (amplitude modulation)

- Callsign: EB-1142

Accountability-Free Genocides

 

Militarized "psychiatry"

 

The Absolute Evil

 

Gang-stalking Greeks

 

Byzantine Atrocities

 

European Dissidents ALARM

 

Human Rights' Court

 

The used up men

 

Dissidents - USG RICO crimes

 

Open Letter to Theresa May

 

Open Letter to António Guterres UN's SG

 

Triangulation - Zersetzen

 

Open Letter to Andrew Parker, MI5

  

Πράξεις ποταπές - Despicable choices

 

 

My father's death

 

Cavitation damage

 

Burglary and vandalism

 

Dry mini submarine

 

Message to Bundeswehr 2

 

Message to Bundeswehr 1

 

“Tough” guys and TOUGH guys

 

Μοναδική λύση, το Χόλιγουντ

 

Charlatans

 

Zeppelin: Beyond Gravity

 

Foreign intervention in Greece?

 

Η ανελεύθερη Ελλάδα

 

Η Ελλάδα καταγώγιο;

 

Αν.Επ. Π. Παυλόπουλο

  

Intangible prisons

 

Plausible deniability

 

Images of German w & s

 

Crimes against Humanity

 

"Chimera" - "Bellerophon"

 

pr. Donald Trump

 

  

Legal Notice 87

 

Βδέλλες, αποικιοκρατικές

 

Being a German

 

Legal Notice 84

 

Dirty colonial methods

 

Georgi Markov, BG - KGB

 

Samples of Barbarity

 

Ελλάδα - αποκόλληση

 

Έλληνες, στο έλεος...

 

Harvester's log 16/3/17

 

 

Legal Notice 66

 

Execrable

 

Legal Notice 62

 

  

My story

 

  

Aggression?

 

  

Η Εστία μου

 

  

Why so untidy?

 

  

Αποικιοκρατία

 

  

Εξόντωση Ελλήνων αντιφρονούντων;

 

  

Ζήτημα εμπιστοσύνης

 

  

Μεθοδικότητα

 

  

Ανοικτή Επιστολή πρέσβη ΗΠΑ

Αφορμή, U2RIT vs Ελλάδα;

Βιοηθική

A request to U2RIT

Colonial aggression - 2

Open Letter to UN S.G.

Open Letter to p.C. & p. O.

Δήλωση πρόθεσης επαναπατρισμού

 

Ο "εφιάλτης" της Νυρεμβέργης

Συλλογή Φωτογραφιών

Αίτημα προστασίας, προς Ιταλία

Chroma key, background removal

Science and Ethics

Να συμβάλει και η U2RIT

Θα ξαναφτιάξουν πολλές φορές Άουσβιτς και Zyclon B

 

Split-Screen effect

Η Ζωή είναι Ωραία.

Βόρεια Κορέα

Λευτεριά στους Έλληνες, εξανα- γκαστικά "Εξαφανισμένους"

 

Μυστικές δίκες;

Trustworthiness

Πολιτισμό, ή, απληστία;

Ακραία Στυγνότητα

Η Τέχνη της Επιβίωσης

Political Asylum 3

Επιστροφή στις ρίζες

The Human Cost of Torture

An urgent appeal for solidarity

More obvious than the Sun

Western "culture"

Political Asylum

Έννομη Προστασία

Μια μήνυση που εγείρει ερωτηματικά

 

 

 

Honor your father...

Noise

Creative Greeks

A pair of Dictatorships

Cryptography PDF Εκτύπωση E-mail
Καινοτομίες - Μαθηματικά
Παρασκευή, 27 Μάρτιος 2015 23:24

enigma-m3-1939.jpg

 

Cryptography (or cryptology; from Greek κρυπτός kryptós, "hidden, secret"; and γράφειν graphein, "writing", or -λογία -logia, "study", respectively) is the practice and study of techniques for secure communication in the presence of third parties (called adversaries). More generally, it is about constructing and analyzing protocols that block adversaries; various aspects in information security such as data confidentiality, data integrity, authentication, and non-repudiation are central to modern cryptography. Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, and electrical engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce.

Cryptography prior to the modern age was effectively synonymous with encryption, the conversion of information from a readable state to apparent nonsense. The originator of an encrypted message shared the decoding technique needed to recover the original information only with intended recipients, thereby precluding unwanted persons from doing do the same. Since World War I and the advent of the computer, the methods used to carry out cryptology have become increasingly complex and its application more widespread.

Modern cryptography is heavily based on mathematical theory and computer science practice; cryptographic algorithms are designed around computational hardness assumptions, making such algorithms hard to break in practice by any adversary. It is theoretically possible to break such a system, but it is infeasible to do so by any known practical means. These schemes are therefore termed computationally secure; theoretical advances, e.g., improvements in integer factorization algorithms, and faster computing technology require these solutions to be continually adapted. There exist information-theoretically secure schemes that provably cannot be broken even with unlimited computing power—an example is the one-time pad—but these schemes are more difficult to implement than the best theoretically breakable but computationally secure mechanisms.

[wiki]


One very interesting domain for innovative applications is cryptography because this domain combines some of the most interesting issues of mathematics, computer science and electrical engineering.

For example, by using model M3 (1939) of Enigma cipher machine, I could send to some of my friends, encrypted, one of the saddest lessons of history*. For the encryption, I have used the following settings:


Cipher machine: Enigma
Model: M3 (1939)
Key: CHR
Reflector: B
Rotor settings
Wheel number: VII,III,I
Ring setting: 07(G),03(C),01(A)
Plug board pairs: CH FO IR ST

 

MYXKAIDOFBLBVGQAJYVMRGARPCDOQWSNNJILTHBOROBCTKVQLHOVNHMRBHGFUTYQUHCAKCOUOKYACVADQJSVUFYAEZNAKVXPYZAGUKXAPEDTGZGBVJEWXUISNKBPOYRMZAEJSWBRPOYXIEPBJWSWZPPHMMDOJIZZIUAVMITEZYAETJYOFQBPTTJQYGHATGVACZDJOYTSSGVIMTAABAUVIACEGPKMWDGAXXIXNVQQIQAOWXAOQGTEYLHSVMDHFVLKFPJSNWGETYKANNRHXGSKTRRIFRZUOAYOOBYMSVEKSWLWKEYXQWXFZZXVBYTPVOMMUZJSMUBWDHFLWZPEUVGYFBOKTUAKMBXFB


Note 1: the photo was found here.
Note 2: * By C.S.

 

 

Τελευταία Ενημέρωση στις Σάββατο, 28 Μάρτιος 2015 12:02