Cryptography

The History and Mathematics of Codes and Code Breaking

Category: Bookmark Assignments Page 1 of 4

Bookmark Assignment #7

For your next bookmark assignment, find and bookmark a resource that helps answer one or more of the “first questions” we brainstormed in class yesterday. If you’d like to address a “first question” not on the class list, that’s fine. Either way, be sure to find a resource that’s credible.

Save your bookmark to our Diigo group, tag it with “FirstQuestions” and at least two other tags, and put the question you’re trying to answer in a comment attached to the bookmark. Your bookmark is due by 9 a.m. on Wednesday, November 20th.

Bookmark Assignment #6

For your next bookmark assignment, find and bookmark a resource that provides an update on one of the topics mentioned in documentary Citizenfour. That documentary was released in 2014. What else do we know now about Edward Snowden, the NSA, or the state of surveillance in the US ? Be sure to select a resource that’s credible.

Save your bookmark to our Diigo group and tag it with “postSnowden” and at least two other tags.

Your bookmark is due by 9 a.m. on Wednesday, November 13th.

Bookmark Assignment #5

For your next bookmark assignment, find and bookmark a resource that shows how cryptography is relevant to the digital life of a college student in 2019. You might share a resource on how cryptography is embedded in the computer systems we use or one that offers advice for protecting one’s digital privacy. Be sure to select a resource that’s credible!

Save your bookmark to our Diigo group and tag it with “practicalCrypto” and at least two other tags. Also: Leave a comment on your bookmark with a piece of advice for a fellow college student, drawn from your resource.

Your bookmark is due by 9 a.m. on Wednesday, November 6th.

Bookmark Assignment #4

For your next bookmarking assignment, find and bookmark a resource on military cryptography. You’re welcome to look for something on the military of the past, or something more current. Be careful to select a resource that’s credible. Save your bookmark to our Diigo group, and tag it with “military” and at least two other useful tags.

Your bookmark is due by 9:00 a.m. on Wednesday, October 9th. We’ll take a little time in class to share your finds. If you have any questions about using Diigo, don’t hesitate to ask.

Bookmark Assignment #3

I maintain a list of Twitter users who provide information, resources, opinions, and occasionally humor about cryptography, encryption, surveillance, and privacy. Here are the members of my “Crypto” Twitter list, and here are their most recent tweets.

For your third bookmarking assignment, find and bookmark a Twitter user who should be added to my “Crypto” Twitter list. Look for scholars, researchers, journalists, or others who are active on Twitter and regularly provide useful perspectives on encryption and its role in our society today. When evaluating a potential addition, know that humor is fine, but crazy is not.

The goal here is to build a list of sources that will provide good material for your  “security vs. privacy” papers later in the semester.

Your bookmark is due by 9 a.m. on Wednesday, September 27th. Please bookmark the Twitter user’s account. The URL should have the form http://twitter.com/username or something similar.

Bookmark Assignment #2

For your second bookmarking assignment, find and bookmark a resource providing information about one of the cryptography or security practices described in Little Brother. Be careful to select a resource that’s both credible and recent. Save your bookmark to our Diigo group, and tag it with “LittleBrother” and at least one other useful tag.

Your bookmark is due by 9:00 a.m. on Wednesday, September 11th. We’ll take a little time in class to share your finds. If you have any questions about using Diigo, don’t hesitate to ask.

Bookmark Assignment #1

For your first bookmarking assignment, you’re invited to bookmark anything you like that’s related to cryptography. Look for a news article or resource on cryptography that’s interesting to you. Be sure that you’re bookmarking a credible source. If you’re not sure where to go with this, look for inspiration in Singh Chapter 1. Save your bookmark to our Diigo group, and give your bookmark at least two useful tags.

Your bookmark is due by 9:00 a.m. on Friday, August 30th. We’ll take a little time in class to share your finds. If you have any questions about using Diigo, don’t hesitate to ask.

Bookmark #5

For your next bookmark assignment, find and bookmark a resource that shows how cryptography is relevant to the digital life of a college student in 2018. You might share a resource on how cryptography is embedded in the computer systems we use or one that offers advice for protecting one’s digital privacy. Be sure to select a resource that’s credible!

Save your bookmark to our Diigo group and tag it with “practicalCrypto” and at least two other tags. Also: Leave a comment on your bookmark with a piece of advice for a fellow college student, drawn from your resource.

Your bookmark is due by 9 a.m. on Monday, October 29th.

Bookmark #4

For your next bookmarking assignment, find and bookmark a resource on a code or cipher appropriate for the class podcast. Note that you cannot choose a code or cipher that has already been covered on One-Time Pod, nor can you bookmark a student essay from the Wonders & Marvels collection.

The goal here is to generate possible podcast topics, and identify useful resources for those topics. Be sure to select a resource that’s credible. Save your bookmark to our Diigo group, and tag it with “historicalCrypto” and at least two other useful tags.

Your bookmark is due by 9 a.m. on Friday, October 12th.

Bookmark #3

I maintain a list of Twitter users who provide information, resources, opinions, and occasionally humor about cryptography, encryption, surveillance, and privacy. Here are the members of my “Crypto” Twitter list, and here are their most recent tweets.

For your third bookmarking assignment, find and bookmark a Twitter user who should be added to my “Crypto” Twitter list. Look for scholars, researchers, journalists, or others who are active on Twitter and regularly provide useful perspectives on encryption and its role in our society today. When evaluating a potential addition, know that humor is fine, but crazy is not.

The goal here is to build a list of sources that will provide good material for your  “security vs. privacy” papers later in the semester.

Your bookmark is due by 9 a.m. on Monday, September 24th. Please bookmark the Twitter user’s account. The URL should have the form http://twitter.com/username or something similar.

Page 1 of 4

Powered by WordPress & Theme by Anders Norén