Musical Ciphers
April 2, 2018 encryption, historyofcryptography, music, Security technology Read more >
April 2, 2018 encryption, historyofcryptography, music, Security technology Read more >
Powered by WPeMatico
January 18, 2018 academicpapers, historyofcryptography, Security technology Read more >
Really good article about the women who worked at Bletchley Park during World War II, breaking German Enigma-encrypted messages.
Powered by WPeMatico
June 29, 2017 enigma, historyofcomputing, historyofcryptography, Security technology, uk, war Read more >
Here is a listing of all the documents that the NSA has in its archives that are dated earlier than 1930.
Powered by WPeMatico
March 21, 2017 foia, historyofcryptography, historyofsecurity, nsa, Security technology Read more >
This is William Friedman’s highly annotated copy of Herbert Yardley’s book, The American Black Chamber.
Powered by WPeMatico
March 20, 2017 books, cryptography, historyofcryptography, historyofsecurity, nationalsecuritypolicy, Security technology Read more >
December 9, 2016 encryption, enigma, historyofcryptography, Security technology Read more >
Yale University Press has published a facsimile of the Voynich Manuscript.
The manuscript is also available online.
Powered by WPeMatico
December 5, 2016 cryptography, historyofcryptography, Security technology Read more >
This is an interesting historical use of viking runes as a secret code. Yes, the page is all in Finnish. But scroll to the middle. There’s a picture of the Stockholm city police register from 1536, about a married woman who was found with someone who was not her husband. The recording scribe “encrypted” her name and home address using runes.
Powered by WPeMatico
January 12, 2015 encryption, historyofcryptography, Security technology Read more >
Jim Sanborn has given the world another clue to the fourth cyphertext in his Kryptos sculpture at the CIA headquarters.
Powered by WPeMatico
November 24, 2014 cia, cryptanalysis, cryptography, encryption, historyofcryptography, Security technology Read more >
October 30, 2014 encryption, enigma, historyofcryptography, Security technology Read more >