(Roughly) Daily

Posts Tagged ‘cryptography

“If you are confused by the underlying principles of quantum technology – you get it!”*…

A tour through the map above– a helpful primer on the origins, development, and possible futures of quantum computing…

From Dominic Walliman (@DominicWalliman) on @DomainOfScience.

* Kevin Coleman

###

As we embrace uncertainty, we might spare a thought for

Alan Turing; he died on this date in 1954. A British mathematician, he was a foundational computer science pioneer (inventor of the Turing Machine, creator of the “Turing Test” (perhaps to b made more relevant by quantum computing :), and inspiration for “The Turing Award“) and cryptographer (leading member of the team that cracked the Enigma code during WWII).  

source

“There’s no idea in economics more beautiful than Arrow’s impossibility theorem”*…

Tim Harford unpack’s Kenneth Arrow‘s Impossibility Theorem (which feels a bit like a socio-economic “Monty Hall Problem“) and considers it’s implications…

… if any group of voters gets to decide one thing, that group gets to decide everything, and we prove that any group of decisive voters can be pared down until there’s only one person in it. That person is the dictator. Our perfect constitution is in tatters.

That’s Arrow’s impossibility theorem. But what does it really tell us? One lesson is to abandon the search for a perfect voting system. Another is to question his requirements for a good constitution, and to look for alternatives. For example, we could have a system that allows people to register the strength of their feeling. What about the person who has a mild preference for profiteroles over ice cream but who loathes cheese? In Arrow’s constitution there’s no room for strong or weak desires, only for a ranking of outcomes. Maybe that’s the problem.

Arrow’s impossibility theorem is usually described as being about the flaws in voting systems. But there’s a deeper lesson under its surface. Voting systems are supposed to reveal what societies really want. But can a society really want anything coherent at all? Arrow’s theorem drives a stake through the heart of the very idea. People might have coherent preferences, but societies cannot…

On choice, law, and the paradox at the heart of voting: “Arrow’s Impossibility Theorem,” from @TimHarford in @WhyInteresting. Eminently worth reading in full.

* Tim Harford

###

As we contemplate collective choice, we might send grateful birthday greetings to the man who “wrote the book” on perspective, Leon Battista Alberti; he was born on this date in 1404.  The archetypical Renaissance humanist polymath, Alberti was an author, artist, architect, poet, priest, linguist, philosopher, cartographer, and cryptographer.  He collaborated with Toscanelli on the maps used by Columbus on his first voyage, and he published the the first book on cryptography that contained a frequency table.

But he is surely best remembered as the author of the first general treatise– Della Pictura (1434)– on the the laws of perspective, which built on and extended Brunelleschi’s work to describe the approach and technique that established the science of projective geometry… and fueled the progress of painting, sculpture, and architecture from the Greek- and Arabic-influenced formalism of the High Middle Ages to the more naturalistic (and Latinate) styles of Renaissance.

from Della Pictura

 source

 source

“Secret codes resound. Doubts and intentions come to light.”*…

 

Music cryptography is a method in which the musical notes A through G are used to spell out words, abbreviations, or codes…

Early 17th- and 18th-century mathematicians and cryptologists such as John Wilkins and Philip Thicknesse argued that music cryptography was one of the most inscrutable ways of transporting secret messages. They claimed that music was perfect camouflage, because spies would never suspect music. When played, the music would sound so much like any other composition that musically trained listeners would be easily fooled, too. Thicknesse wrote in his 1772 book A Treatise on the Art of Deciphering, and of Writing in Cypher: With an Harmonic Alphabet, “for who that examined a suspected messenger would think an old song, without words, in which perhaps the messenger’s tobacco or snuff might be put, contained a secret he was to convey?” Written letters don’t have this advantage…

This music cipher was supposedly proposed by Michael Haydn (brother of Franz Josef Haydn). It appears in an appendix to a biography about Haydn by Werigand Rettensteiner published in 1808.

More musical mischief at “With Musical Cryptography, Composers Can Hide Messages in Their Melodies.”

* Wislawa Szymborska

###

As we bury the lede, we might tip the plumed birthday bonnet to Rene Descartes, the French philosopher and mathematician who thought and therefore was.  He was born on this date in 1596.

Many contemporaries (perhaps most notably, Pascal) rejected his famous conclusion, the dualist separation of mind and body; more (Voltaire, et al.), since.  But Descartes’ emphasis on method and analysis, his disciplined integration of philosophy and physical science, his insistence on the importance of consciousness in epistemology, and perhaps most fundamentally, his the questioning of tradition and authority had a transformative– and lasting– effect on Western thought, and has earned him the “title” of Father of Modern Philosophy.

“In order to improve the mind, we ought less to learn than to contemplate.”
– Rene Descartes

Frans Hals’ portrait of Descartes, c. 1649

source

Written by (Roughly) Daily

March 31, 2018 at 1:01 am

“The most fruitful and natural exercise for our minds is, in my opinion, conversation”*…

 

In this age of Alexa and Siri, it’s worth recalling the (long) history of human-machine conversation.  At MIT in 1966 an experiment with an early form of artificial intelligence anticipated just how close we might grow with our machines…

Client: Men are all alike.

ELIZA (a computer): In what way

Client: They’re always bugging us about something or other.

ELIZA: Can you think of a specific example

Client: Well, my boyfriend made me come here.

ELIZA: Your boyfriend made you come here

Client: He says I’m depressed much of the time.

ELIZA: I am sorry to hear you are depressed

Client: It’s true. I am unhappy.

ELIZA: Do you think coming here will help you not to be unhappy

Client: I need some help, that much seems certain.

– Joseph Weizenbaum, from a transcription of “Computational Linguistics.”

Named after George Bernard Shaw’s ingénue in Pygmalion, the ELIZA program operated on the Project MAC computer system at MIT and made natural language exchange possible between man and machine. ELIZA identified key words and phrases and responded with rote answers that simulated a conversation.

Talking Cure,” via Lapham’s Quarterly.

* Michel de Montaigne, The Essays

###

As we lie back on the couch, we might note that it was on this date in 1928 that the Enigma Machine encoded its first message.

A simple German machine the size of a portable typewriter, ENIGMA allowed for security in communications by a process in which typed letters were replaced by a cipher text displayed on illuminated lamps. The cipher was symmetrical so entering the cipher text into another ENIGMA reproduced the original message. Security was provided by a set of rotor wheels and a series of patch cables whose arrangement was agreed upon previously.

ENIGMA was used extensively by the German military during World War II to transmit battle plans and other secret information. By December of 1941, however, British codebreakers managed to decipher the code, allowing them to routinely read most ENIGMA traffic.

[source- Computer History Museum]

  source

 

Written by (Roughly) Daily

July 15, 2016 at 1:01 am

Coded references…

Readers will recall the role that Alan Turing and the team at Bletchley Park played in cracking the German Enigma code; some analysts and historians reckon that their work may have shortened World War Two by “not less than two years.”

That code was generated by– and thus cracking it turned on deconstructing and understanding– an Enigma Machine.

source

Understandably, there were few such machines ever built.  And equally understandable, those that survive are extremely expensive collectables.  But readers need fear not!  Now, thanks to our friends at Instructables, one can convert a “Kid’s Game to an Enigma Machine“:

Step-by-step instructions at Instructables.

Readers might also want to visit Cabinet Magazine‘s wonderful “How to Make Anything Signify Anything,” a profile of American code breaker (and code maker) William Friedman:

By the time he retired from the National Security Agency in 1955, Friedman had served for more than thirty years as his government’s chief cryptographer, and—as leader of the team that broke the Japanese PURPLE code in World War II, co-inventor of the US Army’s best cipher machine, author of the papers that gave the field its mathematical foundations, and coiner of the very term cryptanalysis—he had arguably become the most important code-breaker in modern history.

As we reach for our decoder rings, we might recall that it was on this date in 1884 that the states of Alabama, Georgia, Illinois, Indiana, Kentucky, Mississippi, North Carolina, South Carolina, Tennessee and Virginia, with (at least) 50 tornadoes.  Known as “The Enigma Outbreak,” it did an estimated a total of $3–4 million in tornado damage (in 1884 dollars; plus an unknown amount of flood and other damage), destroying over 10,000 structures.

Photo: © D. Burgess / NOAA (source)