The History and Mathematics of Codes and Code Breaking

Author: striclr1 (Page 1 of 2)

Criteria for a Strong Debate

I will be a member of the jury for a debate on Monday. There are several things that I expect to see from both teams.

The arguments of both teams need to be well prepared. I want all of the arguments to be thorough and well organized. If the argument is confusing for me to understand, I will be less likely to pick it. I also do not want teams to state the obvious, I want to delve into their topic, and say something that I have not heard before. I want to be compelled by both arguments.
The more unique and interesting a point in the argument is, the more likely I will be to pick it. In my opinion, there is nothing worse than an information that you already know in an argument because it makes the argument boring.

I want teams to have strong counterarguments, and to do this the team must think about what the other team will potentially say. I expect teams to be prepared for counter arguments. To be well-prepared teams must do thorough research for and against their side. Even though the teams need to be well prepared, they need to listen to what the other team says to be able to give a good rebuttal.

How to Stay Protected While Online

Some advice that I would give to a college student is to never assume that what information is stored is safe. I think that if someone doesn’t want their information being leaked online, they shouldn’t put it online in the first place. There is always a possibility that something bad may happen. It would always be safe to keep a physical copy of important information than a digital copy. I also believe that secure passwords are needed to keep online information secure. There are so many occurrences of people having passwords like “password” or “123456”. Both of these passwords are easy to guess, and it makes it easier for hackers to find and steal your information. I think that the passwords that I use for online websites are strong. I keep most of my passwords written down in a notebook, so I would not have to save them online. The reason why I write my important passwords down on a piece of paper is that it is safer to store it on paper than online. If I saved my information on public storages, such as google docs, my information would not be secure. I do not like saving my passwords online; however, there are many password managers that can keep passwords safe. LastPass is a password manager and generator that I believe many college students can benefit from since it can create a secure password and save it for them.

Choosing Between Right and Wrong

If a person was to make a piece of software available on the Internet that was used for malicious reasons by criminals or foreign governments, I do not think that they would be responsible. The person who created it just came up with the technology. They did not force people to use that technology in the wrong way. When something new is invented, the inventor thinks about all the good things that their invention can do not the bad. Take the computer for example. The first computer was made to help humans do what they could not do. It helped them remain efficient. Should the inventor of the first computer be blamed for all of the crimes that are committed on computers? No, it is not fair to the inventor.

I believe that everyone has free will, and they get to decide between choosing the right path and the wrong path. The software is just a fork in the road, and the users of the software choose what path they get to go on. People that violate the inventions of others for harm are choosing the wrong path. I do not think that the inventor should be punished since the person committing the crime made that choice on their own.


The Captivating Story of a Serial Killer

The first thing that I noticed in the podcast "A Killer on the Loose: The Zodiac Ciphers" by Kelsey Brown was the background music. The music went well with the topic of the podcast. The music sounded very ominous and I think that relates to the dark theme of the podcast. Without even completing the podcast I was compelled because the background music captured my attention and made the podcast more interesting. The music would transition with the story when Kelsey would talk about the different subject matter.

One of the things that I admired about the podcast was Kelsey Brown’s use of storytelling. The podcast was very fluid. This makes me want to make my podcast in a similar way. I think that if my podcast was not fluid, there would be a disconnect with the listeners. Kelsey Brown’s podcast is so alluring because of how smoothly it transitions.

The topic of the podcast was very interesting to me. I am an avid enjoyer of murder mysteries, and crime television shows like Criminal Minds. I actually researched the Zodiac Killer a couple of years ago because the zodiac killer was a topic on one of the episodes on the show. I decided to listen to this podcast because the topic relates to my own interests in life. I know that for me to keep the listener’s attention in my own podcast, I have to be passionate about what I am speaking of.

The Logic of Codebreakers Beat Enigma

In the novel The Code Book, Singh argues that German overconfidence in the strength of Enigma was a primary reason why the Germans did not win the war. According to the blog post, “Never Become Lazy and False Genius During War”, the author, Naiksj, suggests that the laziness of the Germans and the way that they never change routine caused them the war. I agree with the author's argument. The Germans would usually begin the day with a weather report and many of their messages would contain similar phrases. This allowed the codebreakers to notice different patterns in the code.

I believe that the Allied powers succeeded because of the logic of the codebreakers. The Germans used the Enigma machine in the same ways every day, and the codebreakers were logical enough to realize this. Any random person would most likely not be able to notice the patterns in the encoded messages. It takes a level of intelligence to figure out what different patterns can represent. When we were first asked what trait is most important on Top Hat the first time I said creativity. I recently changed my answer to logic because after reading more of the book, I decided that logical reasoning has to be involved in codebreaking. Creativity and luck are both important attributes to codebreaking; however, without logic, those two traits cannot do much. I believe that there needs to be a foundation of logic for a code to be broken.

Never Become Lazy and False Genius During War

Solving an Encryption is Easier Said than Done

I believe that the examples in the book would be harder to decipher when no assistance is given. It would be hard to decipher the message while not knowing what type of cipher it is. Telling the readers what kind of code the message is encrypted as gives a hint in how to solve it. If there was no hint, the receiver of the message would have to just guess on how to decipher the message. There are ways to get clues on what type of code is used such as frequency analysis; however, frequency analysis may not be very helpful depending on what type of code was used.

It is easy to understand Singh’s examples in the book because he is trying to teach the readers how to decode the message. The examples that Singh gives are also easy to crack since no one is trying to keep the message hidden anymore. It is easier to decode the messages now than it would be during the time of war. I think that it is harder to decipher codes when in certain situations. The idea that the contents of a message can help alleviate impending war can put an enormous amount of pressure on a person’s shoulder. When I am in stressful situations, an exam, for example, I often make silly mistakes because of how nervous I am. That feeling is a thousand times worse during the times of war because it is not a grade that is at stake, it is the livelihood of a country.


A Small Amount of Privacy can be Lost to Feel More Secure

At the Newseum, there is a board that lets people voice their opinion on the privacy versus security debate. The people were told to write down what they would give up to feel safer on a dry erase board. Someone on the board wrote that they would give up some of their privacy. This corresponds with my own beliefs. I think that it is totally fine if the government uses some surveillance techniques. Even though I believe that the government should use surveillance to protect us, they should not be too extreme with the measures that they take. For example, in the novel Little Brother by Cory Doctorow, Marcus’s dad was pulled over multiple times in a single trip even though there were no signs of him being guilty of any crime. This is an example of the government being too extreme with their surveillance methods, I believe that these methods are unnecessary. When the government uses extreme surveillance methods that results in no privacy, everything turns into chaos as shown in Little Brother. There is a loss of trust between the government and civilians. It is the civilian’s jobs to trust that the government will protect them, and it is the government’s job to protect the citizens while not violating all of their privacy.

Why are the Beale Ciphers so Enticing?

The Beale ciphers are a mystery. No one truly knows if the treasure is real or fabricated. The book said that “Skeptics believe that the entire story was fabricated to profit from the greed of others.” Even though the story may possibly be a hoax, people will not stop trying to decrypt the message. One reason why people are still trying to decrypt the message is the reward. Twenty million dollars is a large amount of money, and some people will do whatever they can to get their hands on it. Greed can motivate people to do outrageous things, that includes solving an extremely difficult encryption.

Being acknowledged is another reason why people are still trying to break the ciphers. If I was to somehow be able to decode the Beale ciphers, the money would be amazing, but I want the acknowledgment that comes with it. It is a dream of mine to be recognized for my efforts, and I believe that others feel the same. If I was to crack a code that has not been broken in around two hundred years, I would be filled with pride. Solving encryptions takes luck, logic, and creativity. If a person was to decipher the Beale ciphers, they would feel accomplished for all of the work that they had to do to solve it since it is not an easily breakable cipher. I believe that the treasure has already been found either by luck or deciphering the encryption. According to the book, conspiracy theorists believe that the treasure has been found by the NSA. It is very likely that the treasure is not real, but people still want to solve it to get recognition.

Can Technology Truly Give a Feeling of Privacy?

In Little Brother by Cory Doctorow, the passage that caught my attention was in Chapter 5 when Marcus talked about how technology made him feel. He said that technology made him feel like he had control, and that technology works for, serves and protects him when it is used the right way. He says the when technology is used right, it could give “power and a sense of privacy”.

I believe that technology has so many good attributes, but with the good there is bad. Even if technology was used in a good way, that does not mean that everyone else would not misuse it. Technology can give a feeling of privacy and protection, but that can be easily violated by hackers or people that mean to do harm. Many people think that they are protected by their technology, and by thinking this they let their guard down. Technology does not work for a single person, it works for anyone who has access to it. While people may think that they are safe and whatever they put online is protected, that is not always the case.

In the beginning of the novel, Marcus abuses his power over technology. He used technology to discover everything there was to know about his vice principal including his social security number, birthday, hometown, and even his mother’s maiden name. Marcus did not use technology in the right way. Even though he wants to use technology for the better, he succumbed to the things he could discover and do with the power of technology. In my opinion, Marcus is very hypocritical. Marcus violated the privacy of his vice principal even though he says that he loves technology because of the feeling of privacy that it gives.


Page 1 of 2

Powered by WordPress & Theme by Anders Norén