The History and Mathematics of Codes and Code Breaking

Blog Assignment #1

For your first blog assignment, write a post between 200 and 400 words that responds to one of the reading questions for Singh Chapter 1.

Please give your post a descriptive title, and use the "Student Posts" category for your post. Also, give your post at least three tags, where each tag is a word or very short phrase (no more than three words) that describe the post's content. You're encouraged to use tags already in the system if they apply to your post.

Your post is due by 9:00 a.m. on Monday, August 28th. If you have any questions about sharing your first post here on the blog, don't hesitate to ask.

Here are some basic instructions for posting to WordPress that you might find useful. Also, via xkcd, here's the secret to using any kind of computer technology.

Image: "Ghost Writer," by me, Flickr (CC)


August Office Hours


Mary Queen of Scots's and Babington's Ignorance in Assuming Security

1 Comment

  1. Ejhazz Milford

    Cryptography — we have seen it everywhere, from the movie screens to the morning news. In fact, so much so that you might even begin to get tired of hearing about it. You may just start to associate it with a couple of things that are easy to remember like The Imitation Games or the NSA (National Security Agency), but that right there is the problem: Mary Queen of Scots, Julius Caesar, Elizabeth I, Xerxes — do these names sound familiar when you think about cryptography? Probably not. That is why Singh chooses to introduce them in Chapter 1.

    Upon opening the book to the first page, you, the reader, are immediately introduced to a grim scenario where Mary Queen of Scots is standing trial for a plot to assassinate Elizabeth I. Only one thing remains in question: the contents of an encrypted message that Mary sent to her alleged conspirators. Singh wastes no time in telling you that the letter actually does incriminate her of the crime, but now you are left wondering whether Elizabeth’s court will actually break the encryption. Immediately, your attention shifts from the contents of the letter to the cryptography around it and thus an excitement is born.

    If Singh had chosen to start his book off in a later time with more classical examples of cryptography, the reader would not be as captivated as they are by the examples and times his book starts off with now.

    It is this excitement for cryptography that most forms of media fail to elicit out of people, yet Singh manages to do so within the first, two pages a book. That excitement eventually fuels more curiosity as the reader realizes that they have only read about the fundamentals — substitution and transposition — which beckons the question, “what else is there to learn?”

Leave a Reply

Your email address will not be published. Required fields are marked *

Powered by WordPress & Theme by Anders Norén