Department of Cryptology: Difference between revisions
(Undo revision 18554 by Special:Contributions/Wd8Epw (User talk:Wd8Epw)) |
|||
(11 intermediate revisions by 3 users not shown) | |||
Line 3: | Line 3: | ||
'''Information Site:''' http://www.perplexcityacademy.com/departments-crypt.html | '''Information Site:''' http://www.perplexcityacademy.com/departments-crypt.html | ||
'''Backdoor Filesystem:''' http://events.perplexcity.com/gateway/commandinterface/index.html | |||
:'''See Also:''' [[Backdoor]] and [[Backdoor Primer]] | |||
==General== | ==General== | ||
Line 15: | Line 20: | ||
There are a number of pages ranging from alpha to gama; all are lightly encoded, and read as follows: | There are a number of pages ranging from alpha to gama; all are lightly encoded, and read as follows: | ||
{ | {{quote}} | ||
===Announcements=== | ===Announcements=== | ||
Line 27: | Line 31: | ||
{ | {{quote}} | ||
===Council Cooperative Agreement=== | ===Council Cooperative Agreement=== | ||
Line 37: | Line 40: | ||
{ | {{quote}} | ||
===Why Cryptology?=== | ===Why Cryptology?=== | ||
Line 51: | Line 53: | ||
{ | {{quote}} | ||
===Faculty & Lecturer information=== | ===Faculty & Lecturer information=== | ||
Line 69: | Line 69: | ||
==Epsilon== | ==Epsilon== | ||
These collectively spell out a riddle, based on their | These collectively spell out a riddle, based on their encryption method. The key words for each encryption spell out a poem: | ||
* Alpha | * Alpha | ||
Line 92: | Line 92: | ||
These appear, when unfurled, to be descriptors of a number of noteworthy documents the department has published. | These appear, when unfurled, to be descriptors of a number of noteworthy documents the department has published. | ||
=== | ===Content=== | ||
====266 Case Study==== | ====266 Case Study==== | ||
An analysis of the Academy security system, strengths and vulnerabilities, action points. [[Kiteway]], [[Scryer]], [[Gatlin]], [[Framingham]]. Access to this study is determined on an as-needed basis. If you are require access to this study to further your research, please speak to the department head or one of the adjunct senior fellows. | An analysis of the Academy security system, strengths and vulnerabilities, action points. [[Sente Kiteway]], [[Rupert Scryer|Scryer]], [[Douglas Gatlin|Gatlin]], [[Framingham]]. Access to this study is determined on an as-needed basis. If you are require access to this study to further your research, please speak to the department head or one of the adjunct senior fellows. | ||
''(NOTE: There seem to be some errors in the clues, notably those that begin "The word before X is Y.")'' | ''(NOTE: There seem to be some errors in the clues, notably those that begin "The word before X is Y.")'' | ||
Line 103: | Line 103: | ||
====267 White Paper==== | ====267 White Paper==== | ||
Neural Desteganographic Decryption. A proposed system to imprint an image with cipher-text recognisable by only the neural pattern of the intended recipient fails to work robustly or over time. Probable real-world uses limited at present. - [[ | Neural Desteganographic Decryption. A proposed system to imprint an image with cipher-text recognisable by only the neural pattern of the intended recipient fails to work robustly or over time. Probable real-world uses limited at present. - [[Fabrizio Cupertine|Cupertine]], [[Johann Stanton|Stanton]]. | ||
====268 Case Study==== | ====268 Case Study==== | ||
Line 110: | Line 110: | ||
====268 White Paper No. 1==== | ====268 White Paper No. 1==== | ||
As secure as your family; social vulnerabilities in the security business. Concludes that one of the most vulnerable points in any security schema is the relationship between the trusted individual and untrusted individuals he or she may be close to, as security practices tend to be | As secure as your family; social vulnerabilities in the security business. Concludes that one of the most vulnerable points in any security schema is the relationship between the trusted individual and untrusted individuals he or she may be close to, as security practices tend to be | ||
significantly less vigilant in the home and among family. Tian | significantly less vigilant in the home and among family. - [[Deborah Fowler|Fowler]], [[Juanita Tian|Tian]] | ||
====268 White Paper No. 2==== | ====268 White Paper No. 2==== | ||
Quantum encryption proof-of-concept and preliminary deployment. An applied quantum entanglement encryption mechanism deployed successfully over a two-mile distance. Implications and next actions. [[Lucas Bazeries|Bazeries]] [[Jack Beech|Beech]] [[Abigail Cienega|Cienega]] [[Karen Moro|Moro]]. Access to this study is determined on an as-needed basis. If you are require access to this study to further your research, please speak to the department head or one of the adjunct senior fellows. | Quantum encryption proof-of-concept and preliminary deployment. An applied quantum entanglement encryption mechanism deployed successfully over a two-mile distance. Implications and next actions. - [[Lucas Bazeries|Bazeries]], [[Jack Beech|Beech]], [[Abigail Cienega|Cienega]], [[Karen Moro|Moro]]. Access to this study is determined on an as-needed basis. If you are require access to this study to further your research, please speak to the department head or one of the adjunct senior fellows. | ||
''(NOTE: The decoding is imperfect, but no part of the meaning is obscured.)'' | ''(NOTE: The decoding is imperfect, but no part of the meaning is obscured.)'' | ||
Line 119: | Line 119: | ||
====269 Case Study==== | ====269 Case Study==== | ||
Threat anaysis of various government institutions including review of possible indicators that critical and secure communications channels have been tampered with or compromised - [[Kiteway]], [[Mansoor]], [[Adamek]], [[Ekeba]], [[Inman]], [[Morgan]], [[Phan]], [[Fennerman]], [[Novak]], [[Romero]] - Access to this study is determined on an as-needed basis if you are require access to this study to further your research, please speak to the department head or one of the adjunct senior fellows. | Threat anaysis of various government institutions including review of possible indicators that critical and secure communications channels have been tampered with or compromised - [[Kiteway]], [[Mansoor]], [[Adamek]], [[Ekeba]], [[Inman]], [[Morgan]], [[Phan]], [[Fennerman]], [[Novak]], [[Romero]] - Access to this study is determined on an as-needed basis if you are require access to this study to further your research, please speak to the department head or one of the adjunct senior fellows. | ||
:Raw, obfuscated data is available at "[[269 Case Study Raw Data]]" | |||
==References== | ==References== | ||
Line 125: | Line 125: | ||
[[Category:Perplex City Academy]] | [[Category:Perplex City Academy]] | ||
[[Category:Cryptology Department]] | [[Category:Cryptology Department]] | ||
Seen on a post-board, in the ''Perplex City Board Game Rules'', is an ad stating "Ibyhagrref arrqrq sbe 90-qnl pelcgbybtl fghql. Zhfg rawbl pvcuref, yvir nybar naq bja bar be zber crgf. Fznyy ubabenevhz gb or cnvq. Bbk 55N91", which is ROT13 for "Volunteers needed for 90-day cryptology study. Must enjoy ciphers, live alone and own one or more pets. Small honorarium to be paid. Box 55A91" |
Latest revision as of 14:29, 18 April 2007
Website: http://crypto.perplexcityacademy.com/
Information Site: http://www.perplexcityacademy.com/departments-crypt.html
Backdoor Filesystem: http://events.perplexcity.com/gateway/commandinterface/index.html
- See Also: Backdoor and Backdoor Primer
General
The department of cryptology, within The Academy, covers areas of discrete mathematics, number theory, information theory, statistics, steganography, security engineering, linguistics and emergent decryption. The department uses some of the most advanced and powerful computers in Perplex City and works closely with other departments including Department of Mathematics and Logic, Department of Natural Sciences and Department of Languages. Recent studies have centred on complete end-to-end security using quantum processes and exploring how information might be delivered, encrypted and decrypted by the brain.
- Senior Fellow of Cryptology: Professor Hunan Mansoor
- Adjunct senior fellows: Iolana Dervent, Raiza Czenechovsky
- Public event speaker: Dr Cho Yuan
Alpha Beta Gamma Delta
There are a number of pages ranging from alpha to gama; all are lightly encoded, and read as follows:
AnnouncementsThe Department has begun registration for its annual conference, De/Cipher, to be held on Academy grounds 2-6 October. The conference covers a wide range of topics, from the latest cutting-edge avenues of research, to business models and concerns, to ethical and legal considerations. Currently enrolled students are highly encouraged to contact their advisors in order to take advantage of free registration. Congratulations to the Department Wheel team, which took first place in this term's inter-departmental competition! The final match, against the Department of Natural Sciences, was a close 3-2 victory during extra time. Nominations are currently being accepted for this year's Saunion Prize. If there is a student you feel significantly improved the level of discourse and educational experience for other students, please submit a nominating form to the office of the Senior Fellow. Due to reliability and performance problems, the WHISK array's existing time slots have been reassigned. If you had a WHISK session scheduled, please contact the lab manager to find out what your new time slot will be. |
Council Cooperative AgreementThe Academy Department of Cryptology has an agreement with the City Council of Perplex City to share information and discoveries relevant to the safe and smooth operation of the city. From time to time, the Department's research results in knowledge that would threaten the security of our economic and military institutions, were it to become public knowledge. Under the terms of our agreement, the Council permits absolutely unfettered research, while holding all affiliated with the department to an ethical standard that requires discrete and prompt disclosure of relevant algorithms and technology. Nonetheless, under the terms of our agreement, the department operates primarily to benefit the people and businesses of the city, and not the government. We choose not to participate in government-instigated research or applications that threaten the privacy of the individual Perplexian. After all, everyone is entitled to a secret; even if it's just an excessive affection for harbonnes. |
Why Cryptology?Cryptology is, simply put, the lifeblood of Perplex City. The Academy Department of Cryptology has its roots deeply entwined with civic and economic advancement. From banking to communications, our modern lifestyle relies heavily on the peace of mind that cryptologic research gives to every single citizen. Here at the Academy, we don't just study cryptology; we define it. Whatever program you participate in, you will be sure to encounter the finest minds in the discipline, and you will be given the tools to conduct research that was barely at the edge of imagination a mere ten years ago. No other cryptological department in the world offers such a breathtaking opportunity. During their time at the Department, our students also get to deepen their understanding by considering real-world problems and applications and participate in internships and consultancies with a broad range of interests, from the PCBC and Centrifuge to the City Council, or even the Earth. Whether it's Porta's proof of the Panton Theorem or Leckworthy's analysis of the Earth-Perplex City data link, each student is sure to find a compelling challenge. Alumni of the Department have gone on to illustrious careers in research and business -- or both. Our own Master of the Academy, Sente Kiteway, famously embarked on a stellar academic career before making his fortune at Centrifuge, and was Senior Fellow of the Department for 11 years before he was elected Master. Though few individuals achieve the exceptional success of Master Kiteway, many of our students go on to very successful careers indeed; Walter Cove-Houghton, who took a degree in the Department in 230, has stood for the PCBC as CTO and CEO after a successful consulting career; legendary Centrifuge researcher and now entrepreneur Gregory Dempsey was a 222 graduate; and City Council Member Kyra Anghanda had a very influential academic career, most notably devising the simplest algorithm ever created for creating and decoding the Olverton-Crane Scramble, before leaving her Adjunct Senior Fellow spot for politics in 257. |
Faculty & Lecturer informationSenior Fellow: Professor Hunan Mansoor Information Theory Security Engineering Linguistics Cross-Departmental Agreements |
Epsilon
These collectively spell out a riddle, based on their encryption method. The key words for each encryption spell out a poem:
- Alpha
- To learn about our scholar's quest
- Beta
- Let your mind their work digest
- Gamma
- Who at the incept of the art
- Delta
- Gave poly symbol code its part
The answer is Leon Battista Alberti. Alberti was a proper Renaissance polymath, and inventor of the Polyalphabetic cipher, and the Cipher disk. Using his name as a sub-directory leads to an "epsilon" page which gives us a number of logic puzzles.
The puzzles are formatted like:
- The second word after "family;" is "vulnerabilities"
- The fourth word before "significantly" is "practices"
- The ninth word before "security" is "that"
- The fifth word before "business." is "social"
These appear, when unfurled, to be descriptors of a number of noteworthy documents the department has published.
Content
266 Case Study
An analysis of the Academy security system, strengths and vulnerabilities, action points. Sente Kiteway, Scryer, Gatlin, Framingham. Access to this study is determined on an as-needed basis. If you are require access to this study to further your research, please speak to the department head or one of the adjunct senior fellows.
(NOTE: There seem to be some errors in the clues, notably those that begin "The word before X is Y.")
267 Case Study
Sharp red and sharp security; the influence of pharmacological substances that influence neural patterns as pertains to voice-recognition and other biometric security implementations. Proposals for new guidelines on developing agitation detection systems to allow for use of cognitive enhancers. - Bradshore, Mittwoch
267 White Paper
Neural Desteganographic Decryption. A proposed system to imprint an image with cipher-text recognisable by only the neural pattern of the intended recipient fails to work robustly or over time. Probable real-world uses limited at present. - Cupertine, Stanton.
268 Case Study
An Analysis of the Djinn Virus as pertains to Next Generation Key Technology - Available on request from Centrifuge. - Coupland, Fowler, Tian
268 White Paper No. 1
As secure as your family; social vulnerabilities in the security business. Concludes that one of the most vulnerable points in any security schema is the relationship between the trusted individual and untrusted individuals he or she may be close to, as security practices tend to be significantly less vigilant in the home and among family. - Fowler, Tian
268 White Paper No. 2
Quantum encryption proof-of-concept and preliminary deployment. An applied quantum entanglement encryption mechanism deployed successfully over a two-mile distance. Implications and next actions. - Bazeries, Beech, Cienega, Moro. Access to this study is determined on an as-needed basis. If you are require access to this study to further your research, please speak to the department head or one of the adjunct senior fellows.
(NOTE: The decoding is imperfect, but no part of the meaning is obscured.)
269 Case Study
Threat anaysis of various government institutions including review of possible indicators that critical and secure communications channels have been tampered with or compromised - Kiteway, Mansoor, Adamek, Ekeba, Inman, Morgan, Phan, Fennerman, Novak, Romero - Access to this study is determined on an as-needed basis if you are require access to this study to further your research, please speak to the department head or one of the adjunct senior fellows.
- Raw, obfuscated data is available at "269 Case Study Raw Data"
References
Seen on a post-board, in the Perplex City Board Game Rules, is an ad stating "Ibyhagrref arrqrq sbe 90-qnl pelcgbybtl fghql. Zhfg rawbl pvcuref, yvir nybar naq bja bar be zber crgf. Fznyy ubabenevhz gb or cnvq. Bbk 55N91", which is ROT13 for "Volunteers needed for 90-day cryptology study. Must enjoy ciphers, live alone and own one or more pets. Small honorarium to be paid. Box 55A91"