Anonymizing identifiers question. We have datasets with unique client identifiers. We get many requests from researchers for anonymized datasets for analyses. I'd like to find an operation that could securely create anonymous identifiers but that would also allow us to de-anonymize the records if needed. [more inside]
posted by jasper411
on Feb 3, 2012 -
this xkcd panel
talks about human friendly passwords, that there is more entropy in four random english words eg: 'pickle teapot enthusiasm membrane' than the standard password format of about ten gibberish characters 'S@Nt&KLaWs'.
Has anyone integrated this idea into a public-key cryptography system to allow keys that are words therefore more memorable, or encrypting and hashing into english words?
what [ are / would be ] the [problems/other interesting qualities] of such a system?
posted by compound eye
on Dec 15, 2011 -
A software application needs to supply a fixed password to an outside hardware device that it talks to. How can that password be concealed from hackers who take apart the software or the computer it's running on? [more inside]
posted by Paquda
on Nov 24, 2011 -
How do I securely implement a cryptographic challenge-response in software if the software needs my AES key to create the challenge? [more inside]
posted by odinsdream
on May 4, 2011 -
I recently read that the US government considers AES suitable for classified information. Do other countries publish similar recommendations? [more inside]
posted by tomwheeler
on Dec 27, 2010 -
I get to teach myself Cryptography for a class, please help me pick my book! [more inside]
posted by zidane
on Nov 14, 2010 -
I'm staying in an Embassy Suites hotel in Chicago this week.
Today, I returned to the hotel to see that on three of the lower floors, each room had a stack of exactly two identical chairs placed outside the door. This struck me as really odd.
What does it mean? Is it some kind of code for housekeeping or management?
posted by AngerBoy
on Jul 28, 2010 -
What if: RSA was just "cracked" due to a new discovery about prime numbers. What happens around the world on day 1? Total chaos? Or yawns? [more inside]
posted by archae
on Jan 16, 2010 -
What are some fun and simple puzzles or cryptography I can solve with Python to help me learn the basics? [more inside]
posted by cowbellemoo
on Feb 28, 2008 -
Where can I find some good resources that contrast public key cryptography algorithms (like RSA) with Elliptic Curve? [more inside]
posted by pallak7
on Dec 5, 2007 -
Where can I purchase a color-nicely bound reproduction of the Voynich Manuscript? [more inside]
posted by dmd
on Apr 17, 2007 -
Cryptofilter: My daughter is at summer camp and I can snail mail her or I can send email that will be printed out and delivered. The email is fast but readable by whoever prints/delivers the paper etc. Looking for a cipher that would be easy to learn and use... [more inside]
posted by kaytrem
on Aug 8, 2006 -
So last night on the train I saw a passenger with a small blue paper book titled "OFFICIAL CYPHER" [more inside]
posted by sol
on Mar 21, 2006 -
CryptographyFilter: I'm an obsessive journaler, partly because I enjoy writing ideas etc down in my journals, partly because I have a terrible memory. Every now and then I would like to be able to record something in my journal that I wouldn't want to be read by someone who was less respectful of my privacy than I would hope them to be, or by someone who picked up one of my journals (which always have my contact details in the front) should I misplace one. [more inside]
posted by anonymous
on Jan 2, 2006 -
Could the US government's efforts to scan the contents of everyone's email be overloaded by everyone routinely using encryption for every message? [more inside]
posted by pracowity
on Dec 21, 2005 -
A friend of mine and I were wondering today how encryption was done in character-based languages like Chinese and Japanese before the advent of computerization. Whereas all kind of substitution and transposition ciphers come to mind immediately for letter based languages like Latin, it isn't obvious how you could use them for a language with many thousands of distinct characters.
posted by sindark
on Dec 5, 2005 -
How do we know the mathematical models of physics — equations modeling the universe — apply across the universe, to data we collect about the universe that may be billions of years old? (What would be the process for verifying this?) [more inside]
posted by Rothko
on Dec 2, 2005 -
Needed: a photo or at least more information about a particular system of coded communication supposedly used in ancient china along the Great Wall. Either my google-fu is failing me or I dreamed this whole thing up. [more inside]
posted by fatllama
on Mar 9, 2005 -
Given a couple of encrypted hash strings, I need to identify the algorithm used to generate the hashes so that I can brute-force decrypt them. More inside.. [more inside]
posted by mrbill
on Jun 16, 2004 -
Prompted by the unsolved codes thread in the blue, I'm trying to remember the name of one that I didn't see there. I think I read about it on MeFi at some point. ISTR that it took (takes?) the form of annual ads in a college newspaper (out west somewhere?) on a given day. For some reason May Day is stuck in my head, but googling for it doesn't reveal anything. This went on for several years, and may still be occuring, but no one has ever figured out what it's all about. Does this ring any bells for anyone? My google fu is failing, and I'm going bonkers!
posted by jammer
on May 18, 2004 -
Does anyone know of any famous codes or ciphers that have gone unsolved for lengthy periods of time or remain unsolved? I am thinking specifically of things like The May Day Mystery
and the Voynich Manuscript
). So things more like those and generally less like the Beale Cipher
. Maybe something to do with Art Brut or Outsider art or perhaps Kabbalic systems like Gematria. Or, if all else fails maybe something by the Rosicrucians or Freemasons?
Put another way, I am looking for cryptic and complex visual systems that maintain an internal logic (however faulty or suspect) and ESPECIALLY anything having to do with the interpretation and/or decipherment of such systems.
posted by mokujin
on May 7, 2004 -