Cryptography

The History and Mathematics of Codes and Code Breaking

Author: Hanqing

How should us certainly “PROTECT” the Students?

In this essay, the author hopes that the threat-assessment teams use of the Students’ internet data or the daily behavior to verify does the student have a tendency to endanger the safety of the campus. Why don’t we start with the basic part of the problem, but stop them when they have turned students into dangerous people?

The bullying on campus, the teacher’s indifference to students, the tremendous pressure on school, etc., these may become BULLETS that break the last line of defense of students’ psychology. In China, we call this “The last straw that crushed the camel”. Why don’t we pay more attention to these students in their daily life, why the teachers can not put more patient on these students, why the classmates cannot stop the bullying on campus? Have you ever thought that if you do this, you might become the next target to be shot?

I don’t agree with the opinion of the author, one is that it didn’t slive the problem from the root. Another is that the students should also be protected. Not only the life of them but also the pieces of information about them.  We actually should do something to protect the students from physical to psychic, they are the future of the country. But look now, what we use to protect the students?

We use guns to protect the president.

We use guns to protect the star.

We use guns to protect the governor.

We usee guns to protect banks.

We use guns to protect factories.

But we use only one sign reads “This is a gunless zone” to protect our children. And When a shooting incident occurs, call the police with guns to help.

That looks ridiculous but this is the fact, this is the truth. If we can’t protect students in real life, not only that but also invade the privacy of students on the Internet, one day students will break out. Who is willing to live under the supervision of others? The Internet is a tool that facilitates our lives, not as a means of investigating our personal information.

Cryptography for different types of people

In the era of rapid technological advancement, the use of cryptography has become an important factor in protecting corporate employees and their customers’ personal information and privacy. Actually, not only the corporates use the cryptography, we can also see the cryptography appears in our daily life.

In Chapter 1 of The Code Book, the author use many examples of well-resourced people such as Mary Queen, the leader of Greece and Persia, and many other types of people who are very important for the country or the security of the country.

In China, there are also these types of the cipher by using in the ancient. “Yin Fu” can be regarded as the earliest military password. When using the two parts, each party will perform half of it to verify the true and the false. The Yin is different in length and length, representing the corresponding intelligence. There is no text on it, even if the enemy seizes it, it cannot be deciphered. In conjunction with the Yin Fu, there is also a “Yinshu“, which is to write a complete piece of information into three pieces and send them separately. After receiving the complete information, the recipients spliced and read the information.

But why should the author use these types of examples? Are there only these people use the cipher in the daily life? The answer is absolutely not. People also use the cipher in their daily life.

In ancient Chinese folk, people used gossip to represent weather, marriage, health, etc. The writing of Chinese words is very complex in ancient. So people use different combinations of gossip represent different pieces of information, there will be countless types of ciphers, but people only need to understand and get the key of the cipher according to the parts they need.

In this example, we can see that not only the well-resourced people use the cipher in their communications, the civilians also use the cipher in their daily life. The reason why most of the well-resourced people’s examples are given is these types of ciphers change the world. In other words, these ciphers have some significant influences. Also we can say they survived those ages.

Page 2 of 2

Powered by WordPress & Theme by Anders Norén