logo
episode-header-image
Apr 2023
8m 12s

How Does Historical Cryptology Work?

iHeartPodcasts
About this episode

To crack ciphers written centuries ago, historical cryptologists have to be half artist, half accountant, and use some of the most powerful computing tools known today. Learn how a team cracked Mary, Queen of Scots's code in this episode of BrainStuff, based on this article: https://science.howstuffworks.com/math-concepts/historical-cryptologists.htm

See omnystudio.com/listener for privacy information.

Up next
Jan 1
How Do Search-And-Rescue Dogs Work?
When every minute counts, search-and-rescue dogs can help locate disaster victims far faster than humans alone. Learn about how they're trained in this episode of BrainStuff, based on this article: https://animals.howstuffworks.com/animal-facts/sar-dog.htm/printableSee omnystudio ... Show More
10m 53s
Dec 31
BrainStuff Classics: Why Do We Drop a Ball on New Year's Eve?
The tradition of dropping a ball in Times Square to mark the beginning of a new year only goes back about a century. Learn about the history -- plus four weird things that other cities drop instead -- in this classic episode of BrainStuff.See omnystudio.com/listener for privacy i ... Show More
5m 18s
Dec 30
Can You Really Die of Boredom?
No, you can't literally die of boredom -- but it can lead to some high-risk behaviors. Learn more about boredom, ennui, and how to shake them in this episode of BrainStuff, based on these articles: https://science.howstuffworks.com/life/inside-the-mind/emotions/bored-to-death.htm ... Show More
8m 17s
Recommended Episodes
Aug 2023
Comment décrypter un texte codé ? - Entretien avec George Lasry
<p>Mes chers camarades, bien le bonjour ! </p><p>Il y a quelques mois au moment de la sortie de cet épisode, une actualité historique a fait grand bruit : un ensemble de lettres codées écrites par la reine d’Écosse Marie Stuart et conservées à la BNF ont été décryptées ! À cette ... Show More
4m 37s
Oct 2020
Episode 2: Breaking Lightweight Symmetric Cryptography!
Aside from working on a competition for standardizing post-quantum primitives, the United States National Institute of Standards and Technology, or NIST, has also organized a lightweight cryptography competition meant to attract designs for symmetric primitives, such as hash func ... Show More
34m 24s
Oct 2018
TechStuff Classic: TechStuff Ponders an Enigma
What was the Enigma machine? What is a cipher? How did the Enigma machine work? Join Chris and Jonathan to learn more about cryptography. Learn more about your ad-choices at https://www.iheartpodcastnetwork.comSee omnystudio.com/listener for privacy information. 
37m 43s
Sep 2012
Codes! Axis Cryptography in World War II
<p>In this special episode co-hosted by TechStuff's Jonathan Strickland, the focus is on the codes, cipher machines, and cryptologists of World War II. Tune in to learn more about the Enigma Machine, Alan Turing, Code Talkers and more.</p><p> </p> Learn more about your ad-choices ... Show More
45m 47s
Aug 2022
Cryptocurrency
If you feel confused and left behind by cryptocurrency then this is for you. We're taking you on a journey through the strange history of cryptocurrency. Why and how does it exist? It turns out this history isn’t so much about clever codes as good old-fashioned politics. Our guid ... Show More
48m 35s
Nov 2019
Cryptographers, quantum computers and the war for information | Craig Costello
<p>In this glimpse into our technological future, cryptographer Craig Costello discusses the world-altering potential of quantum computers, which could shatter the limits set by today’s machines -- and give code breakers a master key to the digital world. See how Costello and his ... Show More
16m 19s
Dec 2020
Episode 10: Exploiting Authenticated Encryption Key Commitment!
Authenticated encryption such as AES-GCM or ChaCha20-Poly1305 is used in a wide variety of applications, including potentially in settings for which it was not originally designed. A question given relatively little attention is whether an authenticated encryption scheme guarante ... Show More
46m 34s
Jun 2022
Can Computers Be Mathematicians?
<p><span style="font-weight: 400">How do you teach mathematics to an artificial intelligence? AI has already bested humans at various problem-solving tasks, including games like chess and Go. But before any task can be tackled by a machine, it must be reinterpreted as  directions ... Show More
32m 50s
Mar 2023
The quantum revolution: Q-Day
<p>In the cybersecurity world they call it Q-Day, the day when a quantum computer will be built that can break the encryption of the internet. </p><br><p>John Thornhill and Madhumita Murgia speak to cybersecurity expert and former professional hacker Mark Carney about password cr ... Show More
26m 4s