Top Banner
THE IMPORTANCE OF CRYPTOLOGY AND CODE- BREAKING ON MODERN LANGUAGE AND PRIVACY By: David McDonald
12

The Importance of Cryptology and code-breaking on modern language and privacy

Feb 25, 2016

Download

Documents

Luann

By: David McDonald. The Importance of Cryptology and code-breaking on modern language and privacy. Why codes are important? . - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: The Importance of Cryptology and code-breaking on modern language and privacy

THE IMPORTANCE OF CRYPTOLOGY AND CODE-BREAKING ON MODERN LANGUAGE AND PRIVACY

By: David McDonald

Page 2: The Importance of Cryptology and code-breaking on modern language and privacy

Why codes are important?

We intend to begin on the first of February unrestricted submarine warfare. We shall endeavor in spite of this to keep the United States of America neutral. In the event of this not succeeding, we make Mexico a proposal of alliance on the following basis: we make war together, make peace together, generous financial support and an understanding on our part that Mexico is to reconquer the lost territory in Texas, New Mexico, and Arizona.

Page 3: The Importance of Cryptology and code-breaking on modern language and privacy

Knowledge Issues

How does one keep important messages secret in a time when all languages are public?

How important is secrecy when it comes to language?

To what extent is secrecy important in a time when anyone can find anything by doing a simple web search?

How can people dictate what others see through the use of codes?

Page 4: The Importance of Cryptology and code-breaking on modern language and privacy
Page 5: The Importance of Cryptology and code-breaking on modern language and privacy

Privacy Imagine this…

Page 6: The Importance of Cryptology and code-breaking on modern language and privacy

Perfect Secrecy

How would you win the game? - the locks are a decoy - don’t put your card in the box - place the card back in the deck - shuffle Why does this work? - it’s all about the patterns > just like decrypting codes > codes have patterns

Page 7: The Importance of Cryptology and code-breaking on modern language and privacy
Page 8: The Importance of Cryptology and code-breaking on modern language and privacy

Meet me at Scorpion Ridge.

Page 9: The Importance of Cryptology and code-breaking on modern language and privacy

Theory of Knowledge

How do people dictate what others see?

- how can the encryption of codes be an example of this?

How is the age of public information making it harder for people to communicate in private?

To what extent would it be possible to communicate privately through sites like Twitter or Facebook?

Page 10: The Importance of Cryptology and code-breaking on modern language and privacy

Codes in the Digital Age

Page 11: The Importance of Cryptology and code-breaking on modern language and privacy

Implications of Knowledge:What to leave here with… Could a trivial message be seen as important

when encrypted? How do we go about making things private in

such a public world? Has the world’s information become so

public, that there is no way of keeping it secret?

What is the importance and the implications of keeping language, communication, and messages private on a domestic, national, and international level?

Page 12: The Importance of Cryptology and code-breaking on modern language and privacy

Works Cited

Code Makers & Code Breakers, Cryptologoy (2/3). History Channel, n.d. Documentary.Youtube. History Channel, 11 June 2011. Web. 22 Apr. 2013. <http://www.youtube.com/watch?v=wStSsqR3Q5Y>.

Lindsay, James M. "Council on Foreign Relations." The Water's Edge. Council on Foreign Relations, 1 Mar. 2011. Web. 23 Apr. 2013. <http://blogs.cfr.org/lindsay/2011/03/01/twe-remembers-the-zimmermann-telegram/>.

"Perfect Secrecy | Journey into Cryptography |Khan Academy." Khan Academy. Khan Academy, n.d. Web. 26 Apr. 2013. <https://www.khanacademy.org/math/applied-math/cryptography/crypt/v/perfect-secrecy>.

"Polyalphabetic Cipher | Journey into Cryptography |Khan Academy." Khan Academy. Khan Academy, n.d. Web. 26 Apr. 2013. <https://www.khanacademy.org/math/applied-math/cryptography/crypt/v/polyalphabetic-cipher>.

Vacca, John R. "Public Key Infrastructures (PKIS): What Are They?" Public Key Infrastructure: Building Trusted Applications and Web Services. United States: Auerbach, 2004. 7-9. Google Books. Google, 2004. Web. 25 Apr. 2013. <http://books.google.com/books?id=3kS8XDALWWYC&pg=PA8#v=onepage&q&f=false>.