by: david mcdonald. why codes are important? we intend to begin on the first of february...

12
THE IMPORTANCE OF CRYPTOLOGY AND CODE- BREAKING ON MODERN LANGUAGE AND PRIVACY By: David McDonald

Upload: jeffrey-cowley

Post on 01-Apr-2015

214 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: By: David McDonald. Why codes are important? We intend to begin on the first of February unrestricted submarine warfare. We shall endeavor in spite of

THE IMPORTANCE OF CRYPTOLOGY AND CODE-BREAKING ON MODERN LANGUAGE AND PRIVACY

By: David McDonald

Page 2: By: David McDonald. Why codes are important? We intend to begin on the first of February unrestricted submarine warfare. We shall endeavor in spite of

Why codes are important?

We intend to begin on the first of February unrestricted submarine warfare. We shall endeavor in spite of this to keep the United States of America neutral. In the event of this not succeeding, we make Mexico a proposal of alliance on the following basis: we make war together, make peace together, generous financial support and an understanding on our part that Mexico is to reconquer the lost territory in Texas, New Mexico, and Arizona.

Page 3: By: David McDonald. Why codes are important? We intend to begin on the first of February unrestricted submarine warfare. We shall endeavor in spite of

Knowledge Issues

How does one keep important messages secret in a time when all languages are public?

How important is secrecy when it comes to language?

To what extent is secrecy important in a time when anyone can find anything by doing a simple web search?

How can people dictate what others see through the use of codes?

Page 4: By: David McDonald. Why codes are important? We intend to begin on the first of February unrestricted submarine warfare. We shall endeavor in spite of
Page 5: By: David McDonald. Why codes are important? We intend to begin on the first of February unrestricted submarine warfare. We shall endeavor in spite of

Privacy Imagine this…

Page 6: By: David McDonald. Why codes are important? We intend to begin on the first of February unrestricted submarine warfare. We shall endeavor in spite of

Perfect Secrecy

How would you win the game? - the locks are a decoy - don’t put your card in the box - place the card back in the deck - shuffle Why does this work? - it’s all about the patterns > just like decrypting codes > codes have patterns

Page 7: By: David McDonald. Why codes are important? We intend to begin on the first of February unrestricted submarine warfare. We shall endeavor in spite of
Page 8: By: David McDonald. Why codes are important? We intend to begin on the first of February unrestricted submarine warfare. We shall endeavor in spite of

Meet me at Scorpion Ridge.

Page 9: By: David McDonald. Why codes are important? We intend to begin on the first of February unrestricted submarine warfare. We shall endeavor in spite of

Theory of Knowledge

How do people dictate what others see?

- how can the encryption of codes be an example of this?

How is the age of public information making it harder for people to communicate in private?

To what extent would it be possible to communicate privately through sites like Twitter or Facebook?

Page 10: By: David McDonald. Why codes are important? We intend to begin on the first of February unrestricted submarine warfare. We shall endeavor in spite of

Codes in the Digital Age

Page 11: By: David McDonald. Why codes are important? We intend to begin on the first of February unrestricted submarine warfare. We shall endeavor in spite of

Implications of Knowledge:What to leave here with… Could a trivial message be seen as

important when encrypted? How do we go about making things private

in such a public world? Has the world’s information become so

public, that there is no way of keeping it secret?

What is the importance and the implications of keeping language, communication, and messages private on a domestic, national, and international level?

Page 12: By: David McDonald. Why codes are important? We intend to begin on the first of February unrestricted submarine warfare. We shall endeavor in spite of

Works Cited

Code Makers & Code Breakers, Cryptologoy (2/3). History Channel, n.d. Documentary.Youtube. History Channel, 11 June 2011. Web. 22 Apr. 2013. <http://www.youtube.com/watch?v=wStSsqR3Q5Y>.

Lindsay, James M. "Council on Foreign Relations." The Water's Edge. Council on Foreign Relations, 1 Mar. 2011. Web. 23 Apr. 2013. <http://blogs.cfr.org/lindsay/2011/03/01/twe-remembers-the-zimmermann-telegram/>.

"Perfect Secrecy | Journey into Cryptography |Khan Academy." Khan Academy. Khan Academy, n.d. Web. 26 Apr. 2013. <https://www.khanacademy.org/math/applied-math/cryptography/crypt/v/perfect-secrecy>.

"Polyalphabetic Cipher | Journey into Cryptography |Khan Academy." Khan Academy. Khan Academy, n.d. Web. 26 Apr. 2013. <https://www.khanacademy.org/math/applied-math/cryptography/crypt/v/polyalphabetic-cipher>.

Vacca, John R. "Public Key Infrastructures (PKIS): What Are They?" Public Key Infrastructure: Building Trusted Applications and Web Services. United States: Auerbach, 2004. 7-9. Google Books. Google, 2004. Web. 25 Apr. 2013. <http://books.google.com/books?id=3kS8XDALWWYC&pg=PA8#v=onepage&q&f=false>.