120 likes | 242 Views
By: David McDonald. The Importance of Cryptology and code-breaking on modern language and privacy. Why codes are important? .
E N D
By: David McDonald The Importance of Cryptology and code-breaking on modern language and privacy
Why codes are important? We intend to begin on the first of February unrestricted submarine warfare. We shall endeavor in spite of this to keep the United States of America neutral. In the event of this not succeeding, we make Mexico a proposal of alliance on the following basis: we make war together, make peace together, generous financial support and an understanding on our part that Mexico is to reconquer the lost territory in Texas, New Mexico, and Arizona.
Knowledge Issues • How does one keep important messages secret in a time when all languages are public? • How important is secrecy when it comes to language? • To what extent is secrecy important in a time when anyone can find anything by doing a simple web search? • How can people dictate what others see through the use of codes?
Privacy Imagine this…
Perfect Secrecy • How would you win the game? - the locks are a decoy - don’t put your card in the box - place the card back in the deck - shuffle • Why does this work? - it’s all about the patterns > just like decrypting codes > codes have patterns
Theory of Knowledge • How do people dictate what others see? - how can the encryption of codes be an example of this? • How is the age of public information making it harder for people to communicate in private? • To what extent would it be possible to communicate privately through sites like Twitter or Facebook?
Implications of Knowledge:What to leave here with… • Could a trivial message be seen as important when encrypted? • How do we go about making things private in such a public world? • Has the world’s information become so public, that there is no way of keeping it secret? • What is the importance and the implications of keeping language, communication, and messages private on a domestic, national, and international level?
Works Cited Code Makers & Code Breakers, Cryptologoy (2/3). History Channel, n.d. Documentary.Youtube. History Channel, 11 June 2011. Web. 22 Apr. 2013. <http://www.youtube.com/watch?v=wStSsqR3Q5Y>. Lindsay, James M. "Council on Foreign Relations." The Water's Edge. Council on Foreign Relations, 1 Mar. 2011. Web. 23 Apr. 2013. <http://blogs.cfr.org/lindsay/2011/03/01/twe-remembers-the-zimmermann-telegram/>. "Perfect Secrecy | Journey into Cryptography |Khan Academy." Khan Academy. Khan Academy, n.d. Web. 26 Apr. 2013. <https://www.khanacademy.org/math/applied-math/cryptography/crypt/v/perfect-secrecy>. "Polyalphabetic Cipher | Journey into Cryptography |Khan Academy." Khan Academy. Khan Academy, n.d. Web. 26 Apr. 2013. <https://www.khanacademy.org/math/applied-math/cryptography/crypt/v/polyalphabetic-cipher>. Vacca, John R. "Public Key Infrastructures (PKIS): What Are They?" Public Key Infrastructure: Building Trusted Applications and Web Services. United States: Auerbach, 2004. 7-9. Google Books. Google, 2004. Web. 25 Apr. 2013. <http://books.google.com/books?id=3kS8XDALWWYC&pg=PA8#v=onepage&q&f=false>.