{"id":33723,"date":"2018-07-28T15:42:12","date_gmt":"2018-07-28T19:42:12","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/cryptography-the-science-of-making-and-breaking-codes.php"},"modified":"2018-07-28T15:42:12","modified_gmt":"2018-07-28T19:42:12","slug":"cryptography-the-science-of-making-and-breaking-codes","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/cryptography-the-science-of-making-and-breaking-codes.php","title":{"rendered":"Cryptography: The Science of Making and Breaking Codes"},"content":{"rendered":"<p><p>There are lots of different ways to encrypt a message, from early, simple ciphers to the famous Enigma machine. But its tough to make a code truly unbreakable. <\/p>\n<p>Hosted by: Michael Aranda----------Dooblydoo thanks go to the following Patreon supporters -- we couldn't make SciShow without them! Shout out to Justin Ove, John Szymakowski, Fatima Iqbal, Justin Lentz, David Campos, and Chris Peters.----------Like SciShow? Want to help support us, and also get things to put on your walls, cover your torso and hold your liquids? Check out our awesome products over at DFTBA Records: <a href=\"http:\/\/dftba.com\/scishow\" rel=\"nofollow\">http:\/\/dftba.com\/scishow<\/a><\/p>\n<p>Or help support us by becoming our patron on Patreon:<a href=\"https:\/\/www.patreon.com\/scishow----------Looking\" rel=\"nofollow\">https:\/\/www.patreon.com\/scishow----------Looking<\/a> for SciShow elsewhere on the internet?Facebook: <a href=\"http:\/\/www.facebook.com\/scishowTwitter\" rel=\"nofollow\">http:\/\/www.facebook.com\/scishowTwitter<\/a>: <a href=\"http:\/\/www.twitter.com\/scishowTumblr\" rel=\"nofollow\">http:\/\/www.twitter.com\/scishowTumblr<\/a>: <a href=\"http:\/\/scishow.tumblr.comInstagram\" rel=\"nofollow\">http:\/\/scishow.tumblr.comInstagram<\/a>: <a href=\"http:\/\/instagram.com\/thescishow\" rel=\"nofollow\">http:\/\/instagram.com\/thescishow<\/a><\/p>\n<p>Sources:<a href=\"http:\/\/www.vectorsite.net\/ttcode_04.h\" rel=\"nofollow\">http:\/\/www.vectorsite.net\/ttcode_04.h<\/a>...<a href=\"http:\/\/www.simonsingh.net\/The_Black_C\" rel=\"nofollow\">http:\/\/www.simonsingh.net\/The_Black_C<\/a>...<a href=\"http:\/\/book.itep.ru\/depository\/crypto\" rel=\"nofollow\">http:\/\/book.itep.ru\/depository\/crypto<\/a>...<a href=\"http:\/\/www.cs.trincoll.edu\/~crypto\/hi\" rel=\"nofollow\">http:\/\/www.cs.trincoll.edu\/~crypto\/hi<\/a>...<a href=\"http:\/\/www.sans.org\/reading-room\/whit\" rel=\"nofollow\">http:\/\/www.sans.org\/reading-room\/whit<\/a>...<a href=\"http:\/\/ftp.stmarys-ca.edu\/jsauerbe\/m1\" rel=\"nofollow\">http:\/\/ftp.stmarys-ca.edu\/jsauerbe\/m1<\/a>...<a href=\"http:\/\/www.turing.org.uk\/scrapbook\/ww\" rel=\"nofollow\">http:\/\/www.turing.org.uk\/scrapbook\/ww<\/a>...<a href=\"http:\/\/enigma.louisedade.co.uk\/howitw\" rel=\"nofollow\">http:\/\/enigma.louisedade.co.uk\/howitw<\/a>...<a href=\"http:\/\/www.codesandciphers.org.uk\/eni\" rel=\"nofollow\">http:\/\/www.codesandciphers.org.uk\/eni<\/a>...<a href=\"http:\/\/www.pbs.org\/wgbh\/nova\/military\" rel=\"nofollow\">http:\/\/www.pbs.org\/wgbh\/nova\/military<\/a>...<a href=\"http:\/\/www.cs.miami.edu\/~burt\/learnin\" rel=\"nofollow\">http:\/\/www.cs.miami.edu\/~burt\/learnin<\/a>...<\/p>\n<p><!-- Auto Generated --><\/p>\n<p>View post:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.youtube.com\/watch?v=-yFZGF8FHSg\" title=\"Cryptography: The Science of Making and Breaking Codes\">Cryptography: The Science of Making and Breaking Codes<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> There are lots of different ways to encrypt a message, from early, simple ciphers to the famous Enigma machine. But its tough to make a code truly unbreakable. Hosted by: Michael Aranda----------Dooblydoo thanks go to the following Patreon supporters -- we couldn't make SciShow without them! Shout out to Justin Ove, John Szymakowski, Fatima Iqbal, Justin Lentz, David Campos, and Chris Peters.----------Like SciShow<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-33723","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/33723"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=33723"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/33723\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=33723"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=33723"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=33723"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}