Department of Cryptology: Difference between revisions

From Perplex City Wiki
Jump to navigationJump to search
No edit summary
No edit summary
Line 13: Line 13:
'''266 Case Study:''' An analysis of the Academy security system, strengths and vulnerabilities, action points. Kiteway, Scryer, Gatlin, Framingham. Access to this study is determined on an as-needed basis. If you are require access to this study to further your research, please speak to the department head or one of the adjunct senior fellows. ''(NOTE: There seem to be some errors in the clues, notably those that begin "The word before X is Y.")''
'''266 Case Study:''' An analysis of the Academy security system, strengths and vulnerabilities, action points. Kiteway, Scryer, Gatlin, Framingham. Access to this study is determined on an as-needed basis. If you are require access to this study to further your research, please speak to the department head or one of the adjunct senior fellows. ''(NOTE: There seem to be some errors in the clues, notably those that begin "The word before X is Y.")''


'''269 Case Study:''' Threat anaysis of various government institutions including review of possible indicators that critical and secure communications channels have been tampered with or compromised Kiteway Mansoor Adamek Ekeba Inman Morgan Phan Fennerman Novak Romero Access to this study is determined on an as-needed basis if you are require access to this study to further your research, please speak to the department head or one of the adjunct senior fellows.





Revision as of 21:00, 14 June 2006

This is the Crypto department of the Perplex City Academy

There are a number of pages ranging from alpha to gama; all are encoded. They lead to an epsilon page which gives us a number of logic puzzles, these reveal transcripts and reports.

268 Case Study: An Analysis of the Djinn Virus as pertains to Next Generation Key Technology - Available on request from Centrifuge Tian Fouler Coupland

267 Case Study: Sharp_and Sharp___of_substances that guidelines on developing agitation_systems to allow biometric use of cognitive enhancers. Bradshore Mittwoch macmonkey says : 'voice-recognition and other biometric security of pharmocological' fits in there as well, voice-recognition is th 18th word

267 White Paper: Neural Desteganographic Decryption. A proposed system to imprint an image with cipher-text recognisable by only the neural pattern of the intended recipient fails to work robustly or over time. Probable real-world uses limited at present. Stanton, Cupertine.

266 Case Study: An analysis of the Academy security system, strengths and vulnerabilities, action points. Kiteway, Scryer, Gatlin, Framingham. Access to this study is determined on an as-needed basis. If you are require access to this study to further your research, please speak to the department head or one of the adjunct senior fellows. (NOTE: There seem to be some errors in the clues, notably those that begin "The word before X is Y.")

269 Case Study: Threat anaysis of various government institutions including review of possible indicators that critical and secure communications channels have been tampered with or compromised Kiteway Mansoor Adamek Ekeba Inman Morgan Phan Fennerman Novak Romero Access to this study is determined on an as-needed basis if you are require access to this study to further your research, please speak to the department head or one of the adjunct senior fellows.