<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xml:base="http://132.161.132.157/drupal6"  xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
 <title>Computer Science - encryption</title>
 <link>http://132.161.132.157/drupal6/taxonomy/term/594/0</link>
 <description></description>
 <language>en</language>
<item>
 <title>CS Table 3/8: Encryption</title>
 <link>http://132.161.132.157/drupal6/node/859</link>
 <description>&lt;p&gt;
In light of the recent announcement of Whitfield Diffie and Martin E. Hellman as the winners of the annual ACM Turing Award, we will be discussing their contribution to encryption. We&#039;ll also discuss the RSA encryption algorithm, which introduced asymmetric public key cryptography shortly after Diffie–Hellman. The &quot;assigned&quot; readings are the original academic papers on both subjects, which are surprisingly approachable for non-experts. Do your best to work through the technical details, and we&#039;ll spend much of the discussion Tuesday making sense of the rest, as well as the implications for this work. Printed copies of these two papers are on the bench outside Curtsinger&#039;s office.
&lt;ul&gt;&lt;li&gt;
 Whitfield Diffie, and Martin E. Hellman. &quot;New directions in cryptography.&quot;Information Theory, IEEE Transactions on 22.6 (1976): 644-654.
&lt;/li&gt;&lt;li&gt;
 Ronald LRivest., Adi Shamir, and Len Adleman. &quot;A method for obtaining digital signatures and public-key cryptosystems.&quot; Communications of the ACM 21.2 (1978): 120-126.
&lt;/li&gt;&lt;/ul&gt;
&lt;/p&gt;
&lt;p&gt;Computer science table (CS Table) is a weekly meeting of Grinnell College community members (students, faculty, staff, etc.) interested in discussing topics related to computing and computer science. CS Table meets Tuesdays from 12:00-12:45 in JRC 224C. Students on meal plans, faculty, and staff are expected to cover the cost of their meals. Visitors to the College and students not on meal plans can charge their meals to the department.&lt;/p&gt;
</description>
 <comments>http://132.161.132.157/drupal6/node/859#comments</comments>
 <category domain="http://132.161.132.157/drupal6/taxonomy/term/593">cryptography</category>
 <category domain="http://132.161.132.157/drupal6/taxonomy/term/41">CS Table</category>
 <category domain="http://132.161.132.157/drupal6/taxonomy/term/594">encryption</category>
 <category domain="http://132.161.132.157/drupal6/taxonomy/term/463">Turing Award</category>
 <pubDate>Mon, 07 Mar 2016 13:51:01 +0000</pubDate>
 <dc:creator>petersos</dc:creator>
 <guid isPermaLink="false">859 at http://132.161.132.157/drupal6</guid>
</item>
<item>
 <title>CS Table 3/1: FBI and Apple</title>
 <link>http://132.161.132.157/drupal6/node/858</link>
 <description>&lt;p&gt;We&#039;ll be discussing the controversy behind the FBI&#039;s court order to Apple for assistance in recovering data from the phone of the San Bernadino gunmen.  Below are some readings for this week. Reading packets are also outside of Sam/Charlie&#039;s office on the 3rd floor of Science.
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;http://www.apple.com/customer-letter/&quot;&gt;Apple&#039;s &quot;Message to Our Customers&quot;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://arstechnica.com/apple/2016/02/encryption-isnt-at-stake-the-fbi-knows-apple-already-has-the-desired-key/&quot;&gt;A description of what the court order asks for&lt;/a&gt;&lt;/li&gt; 
&lt;li&gt;&lt;a href=&quot;http://blog.trailofbits.com/2016/02/17/apple-can-comply-with-the-fbi-court-order/&quot;&gt;Technical details behind the request&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://arstechnica.com/tech-policy/2016/02/apple-fires-back-at-doj-this-is-not-a-case-about-one-isolated-iphone/&quot;&gt;Apple&#039;s formal legal response to vacate the request&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;You are encouraged to bring other relevant bits of information to the discussion table.&lt;/li&gt;
&lt;li&gt;I will also add in one additional reading for your consideration, &lt;a href=&quot;https://static.newamerica.org/attachments/3138--113/Encryption_Letter_to_Obama_final_051915.pdf&quot;&gt;an open letter to the White House by a number of industrial and academic leaders earlier last year about the issues raised by this incident&lt;/a&gt;.&lt;/li&gt;&lt;li&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;/p&gt;
&lt;p&gt;Computer science table (CS Table) is a weekly meeting of Grinnell College community members (students, faculty, staff, etc.) interested in discussing topics related to computing and computer science. CS Table meets Tuesdays from 12:00-12:45 in JRC 224C. Students on meal plans, faculty, and staff are expected to cover the cost of their meals. Visitors to the College and students not on meal plans can charge their meals to the department.&lt;/p&gt;
</description>
 <comments>http://132.161.132.157/drupal6/node/858#comments</comments>
 <category domain="http://132.161.132.157/drupal6/taxonomy/term/592">backdoor</category>
 <category domain="http://132.161.132.157/drupal6/taxonomy/term/41">CS Table</category>
 <category domain="http://132.161.132.157/drupal6/taxonomy/term/603">data recovery</category>
 <category domain="http://132.161.132.157/drupal6/taxonomy/term/594">encryption</category>
 <category domain="http://132.161.132.157/drupal6/taxonomy/term/515">iPhone</category>
 <pubDate>Tue, 01 Mar 2016 16:56:53 +0000</pubDate>
 <dc:creator>petersos</dc:creator>
 <guid isPermaLink="false">858 at http://132.161.132.157/drupal6</guid>
</item>
<item>
 <title>CS Table for 11/10: Building back doors into cryptographic standards</title>
 <link>http://132.161.132.157/drupal6/node/839</link>
 <description>&lt;p&gt;During the CS Table on November 10, 2015, we will be discussing the possibility of building back doors into cryptographic standards for use by law enforcement, and the broader issues surrounding privacy, cryptography, and law enforcement. There are &lt;a href=&quot;http://www.cs.grinnell.edu/cs-table&quot;&gt;three (brief) articles on the subject&lt;/a&gt; that give a good introduction to the technical and political issues around this debate.
&lt;/p&gt;


&lt;p&gt;Computer science table (CS Table) is a weekly meeting of Grinnell College community members (students, faculty, staff, etc.) interested in discussing topics related to computing and computer science. CS Table meets Tuesdays from 12:00-12:45 in JRC 224C.  Contact the CS faculty for the weekly reading. Students on meal plans, faculty, and staff are expected to cover the cost of their meals. Visitors to the College and students not on meal plans can charge their meals to the department.  For the up-to-date CS Table schedule, please visit the &lt;a href=&quot;http://www.cs.grinnell.edu/cs-table&quot;&gt;CS Table&lt;/a&gt; webpage.&lt;/p&gt;</description>
 <comments>http://132.161.132.157/drupal6/node/839#comments</comments>
 <category domain="http://132.161.132.157/drupal6/taxonomy/term/592">backdoor</category>
 <category domain="http://132.161.132.157/drupal6/taxonomy/term/593">cryptography</category>
 <category domain="http://132.161.132.157/drupal6/taxonomy/term/594">encryption</category>
 <category domain="http://132.161.132.157/drupal6/taxonomy/term/244">privacy</category>
 <pubDate>Wed, 04 Nov 2015 20:59:40 +0000</pubDate>
 <dc:creator>petersos</dc:creator>
 <guid isPermaLink="false">839 at http://132.161.132.157/drupal6</guid>
</item>
</channel>
</rss>
