Department of Cryptology: Difference between revisions

From Perplex City Wiki
Jump to navigationJump to search
No edit summary
No edit summary
Line 10: Line 10:
'''267 White Paper:''' Neural Desteganographic Decryption. A proposed system to imprint an image with cipher-text recognisable by only the neural pattern of the intended recipient fails to work robustly or over time. Probable
'''267 White Paper:''' Neural Desteganographic Decryption. A proposed system to imprint an image with cipher-text recognisable by only the neural pattern of the intended recipient fails to work robustly or over time. Probable
real-world uses limited at present. [[Stanton]], Cupertine.
real-world uses limited at present. [[Stanton]], Cupertine.
'''266 Case Study:''' An analysis of the Academy security system, strengths and vulnerabilities, action points. Kiteway, Scryer, Gatlin, Framingham. Access to this study is determined on an as-needed basis. If you are require access to this study to further your research, please speak to the department head or one of the adjunct senior fellows. ''(NOTE: There seem to be some errors in the clues, notably those that begin "The word before X is Y.")''


[[Category:Perplex City Academy]]
[[Category:Perplex City Academy]]
[[Category:Cryptology Department]]
[[Category:Cryptology Department]]
[[Category:Crypto_Studies_and_Field_Work]]
[[Category:Crypto_Studies_and_Field_Work]]

Revision as of 20:52, 14 June 2006

This is the Crypto department of the Perplex City Academy

There are a number of pages ranging from alpha to gama; all are encoded. They lead to an epsilon page which gives us a number of logic puzzles, these reveal transcripts and reports.

268 Case Study: An Analysis of the Djinn Virus as pertains to Next Generation Key Technology - Available on request from Centrifuge Tian Fouler Coupland

267 Case Study: Sharp_and Sharp___of_substances that guidelines on developing agitation_systems to allow biometric use of cognitive enhancers. Bradshore Mittwoch macmonkey says : 'voice-recognition and other biometric security of pharmocological' fits in there as well, voice-recognition is th 18th word

267 White Paper: Neural Desteganographic Decryption. A proposed system to imprint an image with cipher-text recognisable by only the neural pattern of the intended recipient fails to work robustly or over time. Probable real-world uses limited at present. Stanton, Cupertine.

266 Case Study: An analysis of the Academy security system, strengths and vulnerabilities, action points. Kiteway, Scryer, Gatlin, Framingham. Access to this study is determined on an as-needed basis. If you are require access to this study to further your research, please speak to the department head or one of the adjunct senior fellows. (NOTE: There seem to be some errors in the clues, notably those that begin "The word before X is Y.")