{"id":30792,"date":"2015-10-26T10:42:18","date_gmt":"2015-10-26T14:42:18","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/journey-into-cryptography-computer-science-khan-academy.php"},"modified":"2015-10-26T10:42:18","modified_gmt":"2015-10-26T14:42:18","slug":"journey-into-cryptography-computer-science-khan-academy","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/journey-into-cryptography-computer-science-khan-academy.php","title":{"rendered":"Journey into cryptography | Computer science | Khan Academy"},"content":{"rendered":"<p><p>      If you're seeing this message, it means we're having trouble      loading external resources for Khan Academy.    <\/p>\n<p>      If you're behind a web filter, please make sure that the      domains *.kastatic.org and      *.kasandbox.org are unblocked.     <\/p>\n<p>            To log in and use all the features of Khan Academy,            please enable JavaScript in your browser.          <\/p>\n<p>                        Learn select topics from computer science -                        algorithms (how we solve common problems in                        computer science and measure the efficiency                        of our solutions), cryptography (how we                        protect secret information), and                        information theory (how we encode and                        compress information).                      <\/p>\n<p>                        We've partnered with Dartmouth college                        professors Tom Cormen and Devin Balkcom to                        teach introductory computer science                        algorithms, including searching, sorting,                        recursion, and graph theory. Learn with a                        combination of articles, visualizations,                        quizzes, and coding challenges.                      <\/p>\n<p>                        How have humans protected their secret                        messages through history? What has changed                        today?                      <\/p>\n<p>                        We've always been communicating.... as we                        moved from signal fires, to alphabets &                        electricity the problems remained the same.                      <\/p>\n<p>                          How have humans protected their secret                          messages through history? What has                          changed today?                        <\/p>\n<p>                                Explore how we have hidden secret                                messages through history.                              <\/p>\n<p>                                Assess your understanding of the                                code breaking presented in the                                ancient cryptography lesson. This                                series of articles and exercises                                will prepare you for the upcoming                                challenge!                              <\/p>\n<p>                                A new problem emerges in the 20th                                century. What happens if Alice and                                Bob can never meet to share a key                                in the first place?                              <\/p>\n<p>                                Ready to try your hand at                                real-world code breaking? This                                adventure contains a beginner,                                intermediate and super-advanced                                level. See how far you can go!                              <\/p>\n<p>                                This is a system of arithmetic for                                integers. These lessons provide a                                foundation for the mathematics                                presented in the Modern                                Cryptography tutorial.                              <\/p>\n<p>                                Why do primes make some problems                                fundamentally hard? To find out we                                need to explore primality tests in                                more detail.                              <\/p>\n<p>                                Would access to coin flips speed up                                a primality test? How would this                                work?                              <\/p>\n<\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read this article:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.khanacademy.org\/computing\/computer-science\/cryptography\" title=\"Journey into cryptography | Computer science | Khan Academy\">Journey into cryptography | Computer science | Khan Academy<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> If you're seeing this message, it means we're having trouble loading external resources for Khan Academy. If you're behind a web filter, please make sure that the domains *.kastatic.org and *.kasandbox.org are unblocked. To log in and use all the features of Khan Academy, please enable JavaScript in your browser<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-30792","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/30792"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=30792"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/30792\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=30792"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=30792"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=30792"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}