Encryption Is Foundational to The Future (Part 4 The Reign of the Electro-Mechanical Cyphers)
After the Word War II and during the Cold War, the security in sensitive communications was ruled by Electro-Mechanical Cyphers.
Until the 1950’s the WWII the ECM Mark II was used by the NATO, when it was replaced by machines like the KL-7.
KL-7 was an electro-mechanical rotor-based off-line cipher machine, developed by the National Security Agency (NSA) and was introduced in 1952 and served for many years as the main cipher machine of the US and NATO.
Encryption Is Foundational to The Future (Part 3 The Begin of the Technological Age)
The first world war showed the importance of cryptography on the battlefield, and the danger of weak encryption. The second world war became a defining moment in the history of cryptography and placed it squarely at the center of military and political strategy from that time to the present day.
The Enigma machine was developed by a German Arthur Scherbius in 1918 and was patented in 1919. It was marketed with portability and confidentiality as it sales features, but it had a lack of commercial success. When Germany discovered that they had lost WW I as a result of their cipher having been cracked by the British, despite the high cost, the machine was adopted by the German Navy in 1926, the Army in 1928 and the Air Force in 1935; also it was introduced into service with other sections of the German government.
Encryption Is Foundational to The Future (Part 2 The Century of Huge Advances)
The 20th century was marked by huge advances in all the humanity areas, and the cryptography not was the exception.
At the begin of the 20th century, cryptography was a labor intensive, error prone process, capable of transforming a small amount of written material into an encoded cipher text form.
With the advancement of communication technology, encryption and decryption came to be actively performed during World War I.
Credit Card numbers or IMEI in Java (Luhn Algorithm)
In order to validate large numbers like credit card and International Mobile System Equipment Identity (IMEI) in every smartphone or tablet over the planet is used the Luhn Algorithm; in this JorgeCode’s publication is explained how to implement it in JAVA.
Go to JorgeCode article: Credit Card numbers or IMEI in Java (Luhn Algorithm)
Julian Bolivar-Galeno is an Information and Communications Technologies (ICT) Architect whose expertise is in telecommunications, security and embedded systems. He works in BolivarTech focused on decision making, leadership, management and execution of projects oriented to develop strong security algorithms, artificial intelligence (AI) research and its applicability to smart solutions at mobile and embedded technologies, always producing resilient and innovative applications.
Welcome to News BolivarTech
Today, after almost 7 years has passed when JulianBolivar.com website was closed due to the political situation that is passing my natal country Venezuela.
I’m returning to talk about my passion, the technology evolution and trends, but now with a more Information Technology and Communications (ITC) security focus point of view based on my expertise acquired during this 7 years but keeping a balanced point of view other technologies and with my other interest like Artificial Intelligence (IA) and Embedded systems.
Regards to everyone and welcome to this new space at BolivarTech.
Julian Bolivar-Galeno is an Information and Communications Technologies (ICT) Architect whose expertise is in telecommunications, security and embedded systems. He works in BolivarTech focused on decision making, leadership, management and execution of projects oriented to develop strong security algorithms, artificial intelligence (AI) research and its applicability to smart solutions at mobile and embedded technologies, always producing resilient and innovative applications.