Cryptography@The New York Times

Latest Articles

The new R.W. Kern Center at Hampshire College is not just an environmentally friendly building. There are also brain twisters to be found and figured out.

By KENNETH CHANG

Nonverbal signs from coaches and catchers allow rapid adjustment by batters and pitchers, but players dont always pick them up under the pressure of an at-bat.

By WAYNE EPPS Jr.

As an eagle-eyed staffer at Bletchley Park, home to Britains wartime code-breakers, Ms. Fawcett identified a message that led to the sinking of the fearsome German warship.

By BRUCE WEBER

Intelligence gathering shed its early stigma and became a growth industry only with the start of World War II.

By JOSEF JOFFE

The authorities want him to unlock the drives, which they believe contain child pornography.

By CHRISTINE HAUSER

An information security analyst writes that an entire industry that sells malicious code has emerged that revolves around defeating encryption.

The New York Times reporters Katie Benner, who covers technology, and Matt Apuzzo, who covers national security, debate the iPhone case as it heads to a hearing.

By KATIE BENNER and MATT APUZZO

Seventy-five years after the two began a trade in top-secret information at Bletchley Park in England, their intelligence links are being questioned.

By STEPHEN CASTLE

In the 1970s, Whitfield Diffie and Martin E. Hellman invented the technology that underpins web commerce.

By JOHN MARKOFF

The techie cultures of Silicon Valley and of Argentina have evolved in such a way to become almost polar opposites of one another.

Weaker encryption will only make it easier for malicious hackers and foreign governments to spy on us.

By ZEYNEP TUFEKCI

A Japanese photographer who only knew about Native Americans from Hollywood westerns became a dedicated chronicler of the Navajo people.

By MONICA ALMEIDA

Wickr, a secure messaging app, is turning is splitting into two entities a nonprofit organization that will focus on promoting privacy, and a business arm that will focus on licensing its encryption protocol to businesses, like banks and hospitals, that rely on secure payments and communications.

By NICOLE PERLROTH

The exhibition Decoding the Renaissance: 500 Years of Codes and Ciphers is brimming with documents and insights about cryptography.

By WILLIAM GRIMES

Auction house to sell notebook with writings by Alan Turing, the Enigma codebreaker.

Lynn Lempel encourages us to hang out on street corners. Also, news about the film The Imitation Game: print out and solve the puzzle Alan Turing created to recruit his Bletchley Park code breakers.

Rolando Sarraff Trujillo, who was released Wednesday from a Cuban prison where he had been held since 1995, provided information on codes used by Cuban spies.

By MARK MAZZETTI, MICHAEL S. SCHMIDT and FRANCES ROBLES

The museum at Bletchley Park, the World War II British code-breaking center, sheds light on methods and people, including Alan Turing.

By EDWARD ROTHSTEIN

Twitter or obscure websites can easily transmit polling data, even when that may be an effort to circumvent the law.

By NATE COHN

The creator of Kryptos, a sculpture that contains an 865-character encrypted message, has released a second clue for the final unsolved section.

The new R.W. Kern Center at Hampshire College is not just an environmentally friendly building. There are also brain twisters to be found and figured out.

By KENNETH CHANG

Nonverbal signs from coaches and catchers allow rapid adjustment by batters and pitchers, but players dont always pick them up under the pressure of an at-bat.

By WAYNE EPPS Jr.

As an eagle-eyed staffer at Bletchley Park, home to Britains wartime code-breakers, Ms. Fawcett identified a message that led to the sinking of the fearsome German warship.

By BRUCE WEBER

Intelligence gathering shed its early stigma and became a growth industry only with the start of World War II.

By JOSEF JOFFE

The authorities want him to unlock the drives, which they believe contain child pornography.

By CHRISTINE HAUSER

An information security analyst writes that an entire industry that sells malicious code has emerged that revolves around defeating encryption.

The New York Times reporters Katie Benner, who covers technology, and Matt Apuzzo, who covers national security, debate the iPhone case as it heads to a hearing.

By KATIE BENNER and MATT APUZZO

Seventy-five years after the two began a trade in top-secret information at Bletchley Park in England, their intelligence links are being questioned.

By STEPHEN CASTLE

In the 1970s, Whitfield Diffie and Martin E. Hellman invented the technology that underpins web commerce.

By JOHN MARKOFF

The techie cultures of Silicon Valley and of Argentina have evolved in such a way to become almost polar opposites of one another.

Weaker encryption will only make it easier for malicious hackers and foreign governments to spy on us.

By ZEYNEP TUFEKCI

A Japanese photographer who only knew about Native Americans from Hollywood westerns became a dedicated chronicler of the Navajo people.

By MONICA ALMEIDA

Wickr, a secure messaging app, is turning is splitting into two entities a nonprofit organization that will focus on promoting privacy, and a business arm that will focus on licensing its encryption protocol to businesses, like banks and hospitals, that rely on secure payments and communications.

By NICOLE PERLROTH

The exhibition Decoding the Renaissance: 500 Years of Codes and Ciphers is brimming with documents and insights about cryptography.

By WILLIAM GRIMES

Auction house to sell notebook with writings by Alan Turing, the Enigma codebreaker.

Lynn Lempel encourages us to hang out on street corners. Also, news about the film The Imitation Game: print out and solve the puzzle Alan Turing created to recruit his Bletchley Park code breakers.

Rolando Sarraff Trujillo, who was released Wednesday from a Cuban prison where he had been held since 1995, provided information on codes used by Cuban spies.

By MARK MAZZETTI, MICHAEL S. SCHMIDT and FRANCES ROBLES

The museum at Bletchley Park, the World War II British code-breaking center, sheds light on methods and people, including Alan Turing.

By EDWARD ROTHSTEIN

Twitter or obscure websites can easily transmit polling data, even when that may be an effort to circumvent the law.

By NATE COHN

The creator of Kryptos, a sculpture that contains an 865-character encrypted message, has released a second clue for the final unsolved section.

Read the rest here:
Cryptography@The New York Times

Related Posts
This entry was posted in $1$s. Bookmark the permalink.