Presentation on theme: "By: David McDonald. Why codes are important? We intend to begin on the first of February unrestricted submarine warfare. We shall endeavor in spite of."— Presentation transcript:
By: David McDonald
Why codes are important? We intend to begin on the first of February unrestricted submarine warfare. We shall endeavor in spite of this to keep the United States of America neutral. In the event of this not succeeding, we make Mexico a proposal of alliance on the following basis: we make war together, make peace together, generous financial support and an understanding on our part that Mexico is to reconquer the lost territory in Texas, New Mexico, and Arizona.
Knowledge Issues How does one keep important messages secret in a time when all languages are public? How important is secrecy when it comes to language? To what extent is secrecy important in a time when anyone can find anything by doing a simple web search? How can people dictate what others see through the use of codes?
Privacy Imagine this…
Perfect Secrecy How would you win the game? - the locks are a decoy - don’t put your card in the box - place the card back in the deck - shuffle Why does this work? - it’s all about the patterns > just like decrypting codes > codes have patterns
Meet me at Scorpion Ridge.
Theory of Knowledge How do people dictate what others see? - how can the encryption of codes be an example of this? How is the age of public information making it harder for people to communicate in private? To what extent would it be possible to communicate privately through sites like Twitter or Facebook?
Codes in the Digital Age
Implications of Knowledge: What to leave here with… Could a trivial message be seen as important when encrypted? How do we go about making things private in such a public world? Has the world’s information become so public, that there is no way of keeping it secret? What is the importance and the implications of keeping language, communication, and messages private on a domestic, national, and international level?
Works Cited Code Makers & Code Breakers, Cryptologoy (2/3). History Channel, n.d. Documentary.Youtube. History Channel, 11 June Web. 22 Apr Lindsay, James M. "Council on Foreign Relations." The Water's Edge. Council on Foreign Relations, 1 Mar Web. 23 Apr "Perfect Secrecy | Journey into Cryptography |Khan Academy." Khan Academy. Khan Academy, n.d. Web. 26 Apr "Polyalphabetic Cipher | Journey into Cryptography |Khan Academy." Khan Academy. Khan Academy, n.d. Web. 26 Apr Vacca, John R. "Public Key Infrastructures (PKIS): What Are They?" Public Key Infrastructure: Building Trusted Applications and Web Services. United States: Auerbach, Google Books. Google, Web. 25 Apr