Latest Articles
The new R.W. Kern Center at Hampshire College is not just an environmentally friendly building. There are also brain twisters to be found and figured out.
By KENNETH CHANG
Nonverbal signs from coaches and catchers allow rapid adjustment by batters and pitchers, but players dont always pick them up under the pressure of an at-bat.
By WAYNE EPPS Jr.
As an eagle-eyed staffer at Bletchley Park, home to Britains wartime code-breakers, Ms. Fawcett identified a message that led to the sinking of the fearsome German warship.
By BRUCE WEBER
Intelligence gathering shed its early stigma and became a growth industry only with the start of World War II.
By JOSEF JOFFE
The authorities want him to unlock the drives, which they believe contain child pornography.
By CHRISTINE HAUSER
An information security analyst writes that an entire industry that sells malicious code has emerged that revolves around defeating encryption.
The New York Times reporters Katie Benner, who covers technology, and Matt Apuzzo, who covers national security, debate the iPhone case as it heads to a hearing.
By KATIE BENNER and MATT APUZZO
Seventy-five years after the two began a trade in top-secret information at Bletchley Park in England, their intelligence links are being questioned.
By STEPHEN CASTLE
In the 1970s, Whitfield Diffie and Martin E. Hellman invented the technology that underpins web commerce.
By JOHN MARKOFF
The techie cultures of Silicon Valley and of Argentina have evolved in such a way to become almost polar opposites of one another.
Weaker encryption will only make it easier for malicious hackers and foreign governments to spy on us.
By ZEYNEP TUFEKCI
A Japanese photographer who only knew about Native Americans from Hollywood westerns became a dedicated chronicler of the Navajo people.
By MONICA ALMEIDA
Wickr, a secure messaging app, is turning is splitting into two entities a nonprofit organization that will focus on promoting privacy, and a business arm that will focus on licensing its encryption protocol to businesses, like banks and hospitals, that rely on secure payments and communications.
By NICOLE PERLROTH
The exhibition Decoding the Renaissance: 500 Years of Codes and Ciphers is brimming with documents and insights about cryptography.
By WILLIAM GRIMES
Auction house to sell notebook with writings by Alan Turing, the Enigma codebreaker.
Lynn Lempel encourages us to hang out on street corners. Also, news about the film The Imitation Game: print out and solve the puzzle Alan Turing created to recruit his Bletchley Park code breakers.
Rolando Sarraff Trujillo, who was released Wednesday from a Cuban prison where he had been held since 1995, provided information on codes used by Cuban spies.
By MARK MAZZETTI, MICHAEL S. SCHMIDT and FRANCES ROBLES
The museum at Bletchley Park, the World War II British code-breaking center, sheds light on methods and people, including Alan Turing.
By EDWARD ROTHSTEIN
Twitter or obscure websites can easily transmit polling data, even when that may be an effort to circumvent the law.
By NATE COHN
The creator of Kryptos, a sculpture that contains an 865-character encrypted message, has released a second clue for the final unsolved section.
The new R.W. Kern Center at Hampshire College is not just an environmentally friendly building. There are also brain twisters to be found and figured out.
By KENNETH CHANG
Nonverbal signs from coaches and catchers allow rapid adjustment by batters and pitchers, but players dont always pick them up under the pressure of an at-bat.
By WAYNE EPPS Jr.
As an eagle-eyed staffer at Bletchley Park, home to Britains wartime code-breakers, Ms. Fawcett identified a message that led to the sinking of the fearsome German warship.
By BRUCE WEBER
Intelligence gathering shed its early stigma and became a growth industry only with the start of World War II.
By JOSEF JOFFE
The authorities want him to unlock the drives, which they believe contain child pornography.
By CHRISTINE HAUSER
An information security analyst writes that an entire industry that sells malicious code has emerged that revolves around defeating encryption.
The New York Times reporters Katie Benner, who covers technology, and Matt Apuzzo, who covers national security, debate the iPhone case as it heads to a hearing.
By KATIE BENNER and MATT APUZZO
Seventy-five years after the two began a trade in top-secret information at Bletchley Park in England, their intelligence links are being questioned.
By STEPHEN CASTLE
In the 1970s, Whitfield Diffie and Martin E. Hellman invented the technology that underpins web commerce.
By JOHN MARKOFF
The techie cultures of Silicon Valley and of Argentina have evolved in such a way to become almost polar opposites of one another.
Weaker encryption will only make it easier for malicious hackers and foreign governments to spy on us.
By ZEYNEP TUFEKCI
A Japanese photographer who only knew about Native Americans from Hollywood westerns became a dedicated chronicler of the Navajo people.
By MONICA ALMEIDA
Wickr, a secure messaging app, is turning is splitting into two entities a nonprofit organization that will focus on promoting privacy, and a business arm that will focus on licensing its encryption protocol to businesses, like banks and hospitals, that rely on secure payments and communications.
By NICOLE PERLROTH
The exhibition Decoding the Renaissance: 500 Years of Codes and Ciphers is brimming with documents and insights about cryptography.
By WILLIAM GRIMES
Auction house to sell notebook with writings by Alan Turing, the Enigma codebreaker.
Lynn Lempel encourages us to hang out on street corners. Also, news about the film The Imitation Game: print out and solve the puzzle Alan Turing created to recruit his Bletchley Park code breakers.
Rolando Sarraff Trujillo, who was released Wednesday from a Cuban prison where he had been held since 1995, provided information on codes used by Cuban spies.
By MARK MAZZETTI, MICHAEL S. SCHMIDT and FRANCES ROBLES
The museum at Bletchley Park, the World War II British code-breaking center, sheds light on methods and people, including Alan Turing.
By EDWARD ROTHSTEIN
Twitter or obscure websites can easily transmit polling data, even when that may be an effort to circumvent the law.
By NATE COHN
The creator of Kryptos, a sculpture that contains an 865-character encrypted message, has released a second clue for the final unsolved section.
Read the rest here:
Cryptography@The New York Times