kryptos

In 1988, as a new headquarters for the American Central Intelligence Agency (CIA) was being built in Langley, Virgina, sculptor Jim Sanborn was commissioned to create artwork for the courtyard of the new building. In 1999, a computer scientist named Jim Gillogly announced that he had solved most of the puzzle. There were four distinct […]

Continue reading


rongorongo

The Bishop questioned the Rapanui wise man, Ouroupano Hinapote, the son of the wise man Tekaki [who said that] he, himself, had begun the requisite studies and knew how to carve the characters with a small shark’s tooth. He said that there was nobody left on the island who knew how to read the characters […]

Continue reading


Latin square

The “Gamma plus two” method for generating “odd order” magic squares, the“Gamma plus two plus swap” method for generating “singly even order” magicsquares, and Durer’s method for generating “doubly even order” magic squares. By Professor Edward Brumgnach, P.E. City University of New YorkQueensborough Community College In combinatorics and in experimental design, a Latin square is […]

Continue reading


WPA2 Key Derivation with Anaconda Python

This post is regarding the WPA2 4-way handshake that is used for authentication and the establishment of encryption keys for secure wireless communication. A practical implementation of the key derivation process is provided in python. The sample packet capture containing the 4-way handshake that is used in this post is available here. The complete source […]

Continue reading