View allAll Photos Tagged cryptography
Michele Reilly is a scientist, an artist, and a systems thinker whose work resists easy classification. She trained in architecture and art at Cooper Union, where she began building intelligent machines and quickly became fascinated by the logic behind them. That curiosity drew her into mathematics, cryptography, macroeconomics, and eventually quantum physics. Her path has been shaped less by credentials than by the depth of her questions.
At MIT, where she teaches in the Department of Mechanical Engineering, Michele works at the intersection of computation and the structure of spacetime. She explores how information flows through the universe, drawing from Claude Shannon’s foundational theories and extending them into the quantum realm. Her research is ambitious, but it is rooted in careful thinking. She is not interested in speculation for its own sake. She wants to know what can be built, what can be measured, and what will last.
In 2016, she co-founded Turing, a quantum technology startup focused on building portable quantum memories and tools for long-distance quantum communication. She works closely with physicist Seth Lloyd on designing the scalable, robust systems needed to move quantum computing from theory into practice. The work is intricate and deliberate, building slowly toward a future that she sees as both beautiful and unfamiliar.
Michele is also a storyteller. Her science fiction series Steeplechase has received awards at Cannes and other international festivals. It reflects her belief that narrative and science are not separate pursuits, but parallel ways of exploring the unknown. In her teaching, she brings these strands together, guiding students through exercises that combine quantum theory, creative writing, and world-building. One of her courses, supported by MIT’s Center for Art, Science and Technology, invites students to imagine speculative futures grounded in scientific inquiry.
On her arm is a tattoo of Alan Turing. It is not ornamental. It is a quiet tribute to a thinker whose life and work continue to shape her own. Turing’s dedication to truth, structure, and the ethical weight of technology is a constant presence in her thinking. She carries it with her, quite literally.
The portrait above was made at The Interval at the Long Now Foundation in San Francisco. Michele is seated beside a polished table that reflects her image. Behind her stands the Orrery, a planetary model designed to keep time for ten thousand years. The setting reflects the spirit of her work. She is grounded in the present but always thinking forward, asking how we might live in ways that honor complexity, care, and continuity. She does not speak often about legacy. She speaks about attention, about precision, and about the discipline of staying with difficult questions until they begin to yield something real.
Bletchley Park in Buckinghamshire, was long the top secret centre for government intelligence. Its radio interception was decisive in the fight against Hitler in the Second World War.
This is a typical teleprinter terminal used during the war.
Taken with a Pentax ME Super on Fujicolor Superia 200 ASA Colour negative stock.
A Lorenz SZ42 encryption machine, as used by Nazi high command. This would sit between a teletype and a radio, XORing cleartext against a pseudorandom stream of characters.
Located at the Fabyan Villa. George Fabyan was a millionaire businessman who founded a private research laboratory. Fabyan's laboratory pioneered modern cryptography. National Security Agency has recognized the laboratories as the birthplace of cryptology
Barry Sanders spoke about the research being done at the U of C on developing quantum computers and quantum cryptography techniques.
The April 24, 2012 Science Café staged by TELUS Spark focused on "Hacking and Cracking: How Safe Are You and Your Computer Systems?"
Drs. Barry Sanders, iCORE Chair of Quantum Information Science at the U of C, and Tom Keenan from the U of C's Faculty of Environmental Design, spoke to the issue of computer data security, the privacy of individual data, and the prospect of quantum computers revolutionizing the future of computing and security. Moderator for the evening was Ben Reed, Director of Calgary's Protospace, a home for hackers and computer innovators. The Ironwood Stage and Grill in Inglewood was again packed with a capacity crowd of 140 for the 2-hour Café.
Art to puzzle over. This work, “An Stelle von” (Instead of) by the Austrian artist Hermann J. Painitz is a word puzzle. Painitz, one of more than 35 post-war Austrian artists whose works were selected for display in the Vienna International Centre when it opened in 1979, was interested in cryptography. The VIC is home to the UN headquarters in Vienna.
Photo credit: UNIS Vienna/Henri Abued Manzano
I grabbed a strange YA cryptographic detective book. It's in Swedish, so maybe I'll learn something!
Colossus - the world's first programmable computer.
en.wikipedia.org/wiki/Colossus_computer
Taken at the National Museum of Computing at Bletchley Park
You got the first hand look at VIA's unique hardware-based Advanced Cryptographic Engine (ACE) into Logitec's NAS server. It is a VIA design win case on VIA ACE-CNX Security Service, a customized service that helps customers to build secure solutions based on VIA Embedded platforms.
Taken at the National Cryptologic Museum, NSA.
Creative Commons photo courtesy of ideonexus, please feel free to use for your own purposes.
Michele Reilly is a scientist, an artist, and a systems thinker whose work resists easy classification. She trained in architecture and art at Cooper Union, where she began building intelligent machines and quickly became fascinated by the logic behind them. That curiosity drew her into mathematics, cryptography, macroeconomics, and eventually quantum physics. Her path has been shaped less by credentials than by the depth of her questions.
At MIT, where she teaches in the Department of Mechanical Engineering, Michele works at the intersection of computation and the structure of spacetime. She explores how information flows through the universe, drawing from Claude Shannon’s foundational theories and extending them into the quantum realm. Her research is ambitious, but it is rooted in careful thinking. She is not interested in speculation for its own sake. She wants to know what can be built, what can be measured, and what will last.
In 2016, she co-founded Turing, a quantum technology startup focused on building portable quantum memories and tools for long-distance quantum communication. She works closely with physicist Seth Lloyd on designing the scalable, robust systems needed to move quantum computing from theory into practice. The work is intricate and deliberate, building slowly toward a future that she sees as both beautiful and unfamiliar.
Michele is also a storyteller. Her science fiction series Steeplechase has received awards at Cannes and other international festivals. It reflects her belief that narrative and science are not separate pursuits, but parallel ways of exploring the unknown. In her teaching, she brings these strands together, guiding students through exercises that combine quantum theory, creative writing, and world-building. One of her courses, supported by MIT’s Center for Art, Science and Technology, invites students to imagine speculative futures grounded in scientific inquiry.
On her arm is a tattoo of Alan Turing. It is not ornamental. It is a quiet tribute to a thinker whose life and work continue to shape her own. Turing’s dedication to truth, structure, and the ethical weight of technology is a constant presence in her thinking. She carries it with her, quite literally.
The portrait above was made at The Interval at the Long Now Foundation in San Francisco. Michele is seated beside a polished table that reflects her image. Behind her stands the Orrery, a planetary model designed to keep time for ten thousand years. The setting reflects the spirit of her work. She is grounded in the present but always thinking forward, asking how we might live in ways that honor complexity, care, and continuity. She does not speak often about legacy. She speaks about attention, about precision, and about the discipline of staying with difficult questions until they begin to yield something real.
The coronation event aimed at celebrating the outstanding German IT Security award granted to Blurry Box cryptographic method, and the key role of Karlsruhe as one of the top 5 European technological hubs. During the gathering entrepreneurial and academic professionals have been able to learn more about the innovation achievement and exchange more futuristic plans.
In the picture Oliver Winzenried, CEO and founder of Wibu-Systems
To learn more about the German IT Security Award you can read here: www.wibu.com/press-release-details/article/first-prize-at...
Secure communications between Houston’s Johnson Space Center (JSC) and the orbiting Space Shuttle were vital. As part of a joint effort between NASA, the Department of Defense, and the National Security Agency, the Space Shuttle Encryption System became operational with the launch of Columbia, STS-4, in 1982. This communications console, although it held no cryptographic equipment, configured the crypto units in use between the shuttle and JSC. It was decommissioned with Atlantis, STS-135, on July 21, 2011 at the conclusion of the Space Shuttle Program.
Seen at the National Security Agency’s National Cryptologic Museum, Fort Meade, Maryland.
An observation from someone who is not an expert in cryptography: Cryptography is about converting order (a written or spoken message) to disorder (an encrypted communication with no clear patterns) and vice versa. Thus, I find it interesting that a number of tools for cryptography—especially prior to the digital age—have a physical order or pattern.
Double container in shape of double cartouche from tomb of Tutankhamun Double container-gold with inlays of carnelian and colored glass takes the form of two cartouches shaped elements mounted on a flat base of silver. Sun disks flanked by ostrich plumes that signify ma'at the proper order of the universe top each container. Each of the four cartouches thus created contains decoration with cryptographic writings of the king's throne name Nebkheperure. | Located in: Egyptian Museum, Cairo.
(BEST SEEN WITH BIG BIRD)
For some time now I've suspected that the magpies were using our clothes hoist to broadcast their covert signals.
Today I finally managed to document a trio of the birds engaged in surveilling the hoist prior to hooking up their communications gear.
While the grounded bird nonchalantly paces out the installation's coordinates his two co-conspirators maintain protective overwatch, pretending to drink from the bird bath, but in actuality standing by to alert their operative in case of detection.
I've received reports from fellow vigilant clothes line owners that they have identified similar operations in this vicinity but prudence dictates that we assume that this activity is widespread rather than merely localised.
Intercepts of the magpie signals translate directly as "Oi! Matttttte! There's a beaut bit a worm over here!" However, cryptographic deciphering reveals the hidden message, "All your base are belong to us".
Enough said I reckon.
Don't say you weren't warned....
--------------------------------------------------------------------------------
It doesn't get too much more dinky-di Aussie than magpies in a backyard with a Hill's Clothes Line.
Australian magpies (Gymnorhina tibicen) are quite formidably hefty birds, and these three white-backed cheeky lads are not particularly concerned by the two somewhat disturbed cats eyeing them from out of frame.
You can hear the distinctive, cheerful warbling carol of the magpies here:
www.abc.net.au/archives/sound/11.ram
New Zealand poet Denis Glover described their distinctive call as sounding something like "quardle oodle ardle wardle doodle...."
The shot's a little blurry 'cos it's taken through a house window, which I really should get around to cleaning if I expect to get more shots of birds coming in to drink, bath and run covert ops.
charismathics exhibits at IBM Pulse 2011, Las Vegas - 27Feb - 2Mar 2011
charismathics is a global leader in identity management software. Its premier product, the charismathics Smart Security Interface (CSSI), makes it cost-effective and easy for enterprises to integrate multiple authentication solutions into a single, transparent interface. Since 2003, charismathics has pioneered the field of Public Key Infrastructure (PKI), introducing the first PKI client to support Trusted Platform Modules (TPM) and the first PKI client to be fully integrated with pre-boot environments. charismathics also bundles its premier solution with silicon based hardware devices, primarily smart cards and USB cryptographic tokens, where physical and logical security needs also meet when contactless chips and RFID tags are embedded. charismathics is partnering with a growing number of world key players in the field of single sign on, hard disk encryption, digital certificate issuance. Envisioning a revolution in mobile Internet devices, charismathics has turned to this technology as well releasing iEnigma, a software which secures handheld units such as the iPhone, the iPod Touch and most phones featuring Windows Mobile, and provides streamlined two-factor authentication for the enterprise. charismathics offers its security products and services in a variety of industries including building security, banking and finance, healthcare, telecommunications, government and computer manufacturing.
Normal daily life along a different timeline - which we cannot find - but have the feeling that it exists - but
Certainly!
Quantum computing represents a groundbreaking advancement in technology, deeply intertwined with the concepts of superposition, entanglement, and interference from quantum physics. Unlike classical computing, which processes information in a linear fashion using bits (0s and 1s), quantum computing utilizes quantum bits or qubits that can exist in multiple states simultaneously. This enables quantum computers to perform numerous calculations at once, effectively navigating through a vast landscape of potential solutions.
The idea of parallel timelines can be likened to the way quantum computers operate. Each decision or computation can be viewed as branching into multiple outcomes, similar to how different timelines might unfold based on various choices. This means that a quantum computer can explore various paths to a solution simultaneously, leading to remarkable efficiencies in solving complex problems.
In practical terms, this capability could revolutionize fields such as cryptography, where quantum computers may break existing encryption methods faster than classical computers. In material science, they could simulate quantum phenomena to discover new materials with desirable properties. Additionally, in optimization problems across various industries, quantum computing offers the potential to find the most efficient solutions more rapidly than traditional methods.
In summary, the link between quantum computing and the concept of parallel timelines highlights a fascinating intersection of technology and theoretical physics, suggesting that our understanding of reality may be more complex and interconnected than we previously imagined.
Taken at the National Cryptologic Museum, NSA.
Creative Commons photo courtesy of ideonexus, please feel free to use for your own purposes.
Taken at the National Cryptologic Museum, NSA.
Creative Commons photo courtesy of ideonexus, please feel free to use for your own purposes.
Caption:
Pictured is Dorothy Ramale, who served as a member of the Navy WAVES from June, 1943 to July, 1944. Ramale worked in Cryptographic Analysis for the Army Signal Corps in Arlington during the war.
Photo courtesy of Dorothy Ramale
---
Ramale_Dorothy_001
Photograph information provided by the donor at the time of scanning. This image is the property of the Library of Virginia and the Virginia WWI & WWII Commission. Not to be used for any purpose without prior permission.
The heart of the Facilities Controls. On the left side is the Transmitter Transfer Switchboard. The TTS sends voice or encrypted teletype signal to selected transmitters for outbound communications. The equipment at the end is the Direct Current Patch Panel (SB-1203/UG. These electronic devices mounted in this rack connects encrypted direct current signal to special cryptographic (coded) equipment. On the right is the Receiver Switchboard. The Receiver Switchboard directs the inbound radio signal from the HF Receivers to a selected Teletype Converter or to a remote Radio Set for voice.
Below Decks tour aboard the U.S.S. Midway (CV-41). U.S.S. Midway Museum, 910 N. Harbor Drive, San Diego, San Diego County, California. June 19, 2018 at 12:19 PM PDT.
The USS Midway is the lead ship of her class and preceding the Essex class. Built for World War Two, however, the Midway was commissioned ten days after the end of World War Two, on September 10, 1945. At the time of her commissioning, the Midway held the record as the largest ship in the world, she held that record until 1955. The Midway served the U.S. Navy for 47 years, seeing action in the Vietnam War, and in Operation Desert Storm. She was decommissioned on April 11, 1992. The Midway was opened to the public as a museum ship on June 7, 2004. The Midway is the only carrier museum in the United States from WWII that is not of the Essex Class.
The Kroenungsfest took place in January 2015 to formally celebrate Blurry Box cryptographic method and its recognition as Best IT Security Innovation, a prestigious award the research institute FZI, the Karlsruhe Institute of Technology and Wibu-Systems received from the Horst Goertz Foundation.
In the picture, Prof. Joern Mueller-Quade, Director of the Center for Applied Security Technology (KASTEL) at KIT - Karlsruhe Institute of Technology
To learn more about the German IT Security Award you can read here: www.wibu.com/press-release-details/article/first-prize-at...
Taken at the National Cryptologic Museum, NSA.
Creative Commons photo courtesy of ideonexus, please feel free to use for your own purposes.
charismathics exhibits at Infosecurity Europe, London, UK - 19-21 April 2011
charismathics is a global leader in identity management software. Its premier product, the charismathics Smart Security Interface (CSSI), makes it cost-effective and easy for enterprises to integrate multiple authentication solutions into a single, transparent interface. Since 2003, charismathics has pioneered the field of Public Key Infrastructure (PKI), introducing the first PKI client to support Trusted Platform Modules (TPM) and the first PKI client to be fully integrated with pre-boot environments. charismathics also bundles its premier solution with silicon based hardware devices, primarily smart cards and USB cryptographic tokens, where physical and logical security needs also meet when contactless chips and RFID tags are embedded. charismathics is partnering with a growing number of world key players in the field of single sign on, hard disk encryption, digital certificate issuance. Envisioning a revolution in mobile Internet devices, charismathics has turned to this technology as well releasing iEnigma, a software which secures handheld units such as the iPhone, the iPod Touch and most phones featuring Windows Mobile, and provides streamlined two-factor authentication for the enterprise. charismathics offers its security products and services in a variety of industries including building security, banking and finance, healthcare, telecommunications, government and computer manufacturing.
Lenovo on Thursday came under fire for preinstalling spyware on some of its laptops.
The software, Superfish, uses the same techniques cybercriminals often employ to crack encrypted traffic from computers to the Internet.
“Superfish is purposely designed to bypass the security of HTTPS...
www.everythingliveon.com/lenovo-rapped-for-preinstalling-...
charismathics exhibits at IBM Pulse 2011, Las Vegas - 27Feb - 2Mar 2011
charismathics is a global leader in identity management software. Its premier product, the charismathics Smart Security Interface (CSSI), makes it cost-effective and easy for enterprises to integrate multiple authentication solutions into a single, transparent interface. Since 2003, charismathics has pioneered the field of Public Key Infrastructure (PKI), introducing the first PKI client to support Trusted Platform Modules (TPM) and the first PKI client to be fully integrated with pre-boot environments. charismathics also bundles its premier solution with silicon based hardware devices, primarily smart cards and USB cryptographic tokens, where physical and logical security needs also meet when contactless chips and RFID tags are embedded. charismathics is partnering with a growing number of world key players in the field of single sign on, hard disk encryption, digital certificate issuance. Envisioning a revolution in mobile Internet devices, charismathics has turned to this technology as well releasing iEnigma, a software which secures handheld units such as the iPhone, the iPod Touch and most phones featuring Windows Mobile, and provides streamlined two-factor authentication for the enterprise. charismathics offers its security products and services in a variety of industries including building security, banking and finance, healthcare, telecommunications, government and computer manufacturing.
Cryptocurrency mining is becoming increasingly popular. Pictured is an image of a Sapphire Crypto Mining Rig.
This image was taken by MoneyBright and released under Creative Commons Attribution licensing. Please feel free to use either commercially or non commercial, but please add a link to www.moneybright.co.uk
charismathics exhibits at IBM Pulse 2011, Las Vegas - 27Feb - 2Mar 2011
charismathics is a global leader in identity management software. Its premier product, the charismathics Smart Security Interface (CSSI), makes it cost-effective and easy for enterprises to integrate multiple authentication solutions into a single, transparent interface. Since 2003, charismathics has pioneered the field of Public Key Infrastructure (PKI), introducing the first PKI client to support Trusted Platform Modules (TPM) and the first PKI client to be fully integrated with pre-boot environments. charismathics also bundles its premier solution with silicon based hardware devices, primarily smart cards and USB cryptographic tokens, where physical and logical security needs also meet when contactless chips and RFID tags are embedded. charismathics is partnering with a growing number of world key players in the field of single sign on, hard disk encryption, digital certificate issuance. Envisioning a revolution in mobile Internet devices, charismathics has turned to this technology as well releasing iEnigma, a software which secures handheld units such as the iPhone, the iPod Touch and most phones featuring Windows Mobile, and provides streamlined two-factor authentication for the enterprise. charismathics offers its security products and services in a variety of industries including building security, banking and finance, healthcare, telecommunications, government and computer manufacturing.