Goto

Collaborating Authors

Cracking Codes with Python

@machinelearnbot

Cracking Codes with Python teaches complete beginners how to program in the Python programming language. The book features the source code to several ciphers and hacking programs for these ciphers. The programs include the Caesar cipher, transposition cipher, simple substitution cipher, multiplicative & affine ciphers, Vigenere cipher, and hacking programs for each of these ciphers. The final chapters cover the modern RSA cipher and public key cryptography.


The Military's Mission: Artificial Intelligence in the Cockpit

#artificialintelligence

"The Cipher Brief has become the most popular outlet for former intelligence officers; no media outlet is even a close second to The Cipher Brief in …


This Is the Zodiac Tweeting

Slate

This is the Zodiac speaking. I am the killer of the 6 to 18 people who Died in the Hurricane last Sept. To Prove this I shall state some facts which only I the police know. I have grown rather angry with the Democrats for their telling lies about me. When I left the Island, AFTER the storm had hit, they had anywhere from 6 to 18 deaths.


The Founding Fathers Encrypted Secret Messages, Too

The Atlantic - Technology

Thomas Jefferson is known for a lot of things--writing the Declaration of Independence, founding the University of Virginia, owning hundreds of slaves despite believing in the equality of men--but his place as the "Father of American Cryptography" is not one of them. As a youth in the Virginia colony, Jefferson encrypted letters to a confidante about the woman he loved. While serving as the third president of the newly formed United States, he tried to institute an impossibly difficult cipher for communications about the Louisiana Purchase. He even designed an intricate mechanical system for coding text that was more than a century ahead of its time. Cryptography was no parlor game for the idle classes, but a serious business for revolutionary-era statesmen who, like today's politicians and spies, needed to conduct their business using secure messaging.


Phishing toolkit uses custom font and substitution cipher to evade detection

#artificialintelligence

For years, cybercriminals have relied on creative obfuscation techniques to make it more difficult for security software to detect phishing attacks. Typically, these rely on obfuscating source code using AES-256 or Base64 encoding inside JavaScript, or custom encoding strategies, making it difficult to analyze the underlying source code. On Thursday, researchers at Proofpoint disclosed a phishing toolkit that uses the novel strategy of encoding data by use of a substitution cipher that relies on a custom font to decode. Substitution ciphers are straightforward for humans to understand, and for a phishing attack to be successful, the decoded data must be displayed to a potential victim. In this attack, cybercriminals use a customized version of the Arial font with individual letters transposed.