<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cryptography Archives - Follow My Vote</title>
	<atom:link href="https://followmyvote.com/tag/cryptography/feed/" rel="self" type="application/rss+xml" />
	<link>https://followmyvote.com/tag/cryptography/</link>
	<description>Blockchain Voting Pioneers</description>
	<lastBuildDate>Fri, 12 Jun 2015 22:58:42 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://followmyvote.com/wp-content/uploads/2013/08/cropped-Follow-My-Vote-T-shirt-White-on-Black-Front-Logo-1-150x150.jpg</url>
	<title>Cryptography Archives - Follow My Vote</title>
	<link>https://followmyvote.com/tag/cryptography/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>A Short History of Cryptography</title>
		<link>https://followmyvote.com/a-short-history-of-cryptography/</link>
					<comments>https://followmyvote.com/a-short-history-of-cryptography/#respond</comments>
		
		<dc:creator><![CDATA[Adam Ernest]]></dc:creator>
		<pubDate>Fri, 12 Jun 2015 22:58:42 +0000</pubDate>
				<category><![CDATA[Inspiration]]></category>
		<category><![CDATA[Knowledge]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Cryptography]]></category>
		<category><![CDATA[Cryptology]]></category>
		<category><![CDATA[Digital Democracy]]></category>
		<category><![CDATA[Follow My Vote]]></category>
		<category><![CDATA[History Of Cryptography]]></category>
		<category><![CDATA[online voting]]></category>
		<category><![CDATA[The History of Cryptography]]></category>
		<guid isPermaLink="false">https://followmyvote.com/?p=7119</guid>

					<description><![CDATA[<p>People have been trying to keep information or data secret since we were able to record information or data. It&#8217;s human nature for us to want to keep private information, private to those that are included in your information or data. It is understood that the history of cryptography goes way back. We have been [&#8230;]</p>
<p>The post <a href="https://followmyvote.com/a-short-history-of-cryptography/">A Short History of Cryptography</a> appeared first on <a href="https://followmyvote.com">Follow My Vote</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>People have been trying to keep information or data secret since we were able to record information or data. It&#8217;s human nature for us to want to keep private information, private to those that are included in your information or data. It is understood that the history of cryptography goes way back. We have been using cryptography for thousands of years, but how does that correlate to what we now currently know as cryptology?</p>
<p>By better understanding how our ancestors utilized standard cryptographic theory we can better understand how the science of hiding information has changed our lives and our civilization. With this change came radical shifts in ideology and sociological environment as well as in our government and everyday lives! Give the following article a read and learn a little about what it takes to keep something hidden from someone and expand that though to how much more complex that must be to achieve in this day and age.</p>
<p><img fetchpriority="high" decoding="async" class="size-medium wp-image-7120 aligncenter" src="https://followmyvote.com/wp-content/uploads/2015/06/cryptology-1-300x298.jpg" alt="" width="300" height="298" srcset="https://followmyvote.com/wp-content/uploads/2015/06/cryptology-1-300x298.jpg 300w, https://followmyvote.com/wp-content/uploads/2015/06/cryptology-1-1024x1017.jpg 1024w, https://followmyvote.com/wp-content/uploads/2015/06/cryptology-1-150x150.jpg 150w, https://followmyvote.com/wp-content/uploads/2015/06/cryptology-1-768x763.jpg 768w, https://followmyvote.com/wp-content/uploads/2015/06/cryptology-1-720x715.jpg 720w, https://followmyvote.com/wp-content/uploads/2015/06/cryptology-1.jpg 1090w" sizes="(max-width: 300px) 100vw, 300px" /></p>
<p>Cryptology is a young science. Though it has been used for thousands of years to hide secret messages, systematic study of cryptology as a science (and perhaps an art) just started around one hundred years ago.</p>
<p>The first known evidence of the use of cryptography (in some form) was found in an inscription carved around 1900 BC, in the main chamber of the tomb of the nobleman Khnumhotep II, in Egypt. The scribe used some unusual hieroglyphic symbols here and there in place of more ordinary ones. The purpose was not to hide the message but perhaps to change its form in a way which would make it appear dignified. Though the inscription was not a form of secret writing, but incorporated some sort of transformation of the original text, and is the oldest known text to do so. Evidence of some use of cryptography has been seen in most major early civilizations. “Arthshashtra”, a classic work on statecraft written by Kautalya, describes the espionage service in India and mentions giving assignments to spies in “secret writing” – sounds like an ancient version of James Bond?</p>
<p>Fast forwarding to around 100 BC, Julius Caesar was known to use a form of encryption to convey secret messages to his army generals posted in the war front. This substitution cipher, known as Caesar cipher, is perhaps the most mentioned historic cipher in academic literature. (A cipher is an algorithm used for encryption or decryption.) In a substitution cipher, each character of the plain text (plain text is the message which has to be encrypted) is substituted by another character to form the cipher text (cipher text is the encrypted message). The variant used by Caesar was a shift by 3 cipher. Each character was shifted by 3 places, so the character ‘A’ was replaced by ‘D’, ‘B’ was replaced by ‘E’, and so on. The characters would wrap around at the end, so ‘X’ would be replaced by ‘A’.</p>
<p>Read More Here: <a href="https://access.redhat.com/blogs/766093/posts/1976023" target="_blank" rel="noopener noreferrer">securityblog.redhat.com.</a></p>
<p>The post <a href="https://followmyvote.com/a-short-history-of-cryptography/">A Short History of Cryptography</a> appeared first on <a href="https://followmyvote.com">Follow My Vote</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://followmyvote.com/a-short-history-of-cryptography/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Key to Online Voting &#8211; The Human Element</title>
		<link>https://followmyvote.com/key-online-voting-human-element/</link>
					<comments>https://followmyvote.com/key-online-voting-human-element/#respond</comments>
		
		<dc:creator><![CDATA[Adam Ernest]]></dc:creator>
		<pubDate>Wed, 28 Jan 2015 12:00:16 +0000</pubDate>
				<category><![CDATA[Elections]]></category>
		<category><![CDATA[Inspiration]]></category>
		<category><![CDATA[Knowledge]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Cryptography]]></category>
		<category><![CDATA[Cryptography in Voting]]></category>
		<category><![CDATA[Internet Voting]]></category>
		<category><![CDATA[online voting]]></category>
		<guid isPermaLink="false">https://followmyvote.com/?p=4794</guid>

					<description><![CDATA[<p>Queensland University of Technology researcher Xavier Boyen feels that the key to truly having a transparent and open source online election is to add the human element back to the algorithm. He mentions that by tying a user made password that only the voter knows it may address the concern of many that votes could [&#8230;]</p>
<p>The post <a href="https://followmyvote.com/key-online-voting-human-element/">The Key to Online Voting &#8211; The Human Element</a> appeared first on <a href="https://followmyvote.com">Follow My Vote</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Queensland University of Technology researcher Xavier Boyen feels that the key to truly having a transparent and open source online election is to add the human element back to the algorithm. He mentions that by tying a user made password that only the voter knows it may address the concern of many that votes could be changed after they have been submitted. While this may seem like a simple solution there is much work involved in making so many passwords. It is important as we move forward to remember to keep our ears and minds open to new ideas that may push our industry to the front lines.</p>
<p style="padding-left: 30px; text-align: left;"><img decoding="async" class="size-medium wp-image-4795 alignleft" src="https://followmyvote.com/wp-content/uploads/2015/01/dude-1-300x169.jpg" alt="human element" width="300" height="169" srcset="https://followmyvote.com/wp-content/uploads/2015/01/dude-1-300x169.jpg 300w, https://followmyvote.com/wp-content/uploads/2015/01/dude-1.jpg 650w" sizes="(max-width: 300px) 100vw, 300px" />Cryptography provides unbreakable data security between computer nodes, but leaves human owners helpless.</p>
<p style="padding-left: 30px;">“The problem is cryptography, in order to be secure, requires heavy computer-assisted calculations to make it efficient and is very impractical for humans to do,’’ Queensland University of Technology researcher Xavier Boyen said. “We have a lot of new techniques that would be much more amenable to human operations while retaining the proven security that we seek in terms of mathematical cryptography.’’</p>
<p style="padding-left: 30px;">Earlier this month, a US internet security firm revealed Russian criminals had stolen 1.2 billion ­internet user names and passwords, probably the largest such theft ever.</p>
<p style="padding-left: 30px;">Associate Professor Boyen has received an Australian Research Council Future Fellowship worth almost $800,000 to build user-owned passwords.</p>
<p style="padding-left: 30px;">“The goal is to come up with a fairly simple but secure way to get the person involved in the very act of authenticating with a remote server or something like that,’’ he said.</p>
<p style="padding-left: 30px;">The project aims to build ­public-key ciphers that can be ­operated manually from a mental key in seconds to let users regain their internet privacy, even ­defending against spyware and malware lurking on their very own mobiles and computers. It would also build security protocols with full end-to-end coverage all the way to the human users.</p>
<p>Read More Here: <a href="https://www.theaustralian.com.au/technology/human-cryptography-the-key-to-online-voting/story-e6frgakx-1227028546184?nk=f7338c3fa61fb2825f1cc3439cf76160/">theaustralian.com.au</a></p>
<p>The post <a href="https://followmyvote.com/key-online-voting-human-element/">The Key to Online Voting &#8211; The Human Element</a> appeared first on <a href="https://followmyvote.com">Follow My Vote</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://followmyvote.com/key-online-voting-human-element/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
