Konferensartikel

Beyond Schlock on Screen: Teaching the History of Cryptology Through Media Representations of Secret Communications

Peter Krapp
Film & Media Studies/ Informatics, Humanities Gateway 2321, University of California, Irvine, USA

Ladda ner artikel

Ingår i: Proceedings of the 2nd International Conference on Historical Cryptology, HistoCrypt 2019, June 23-26, 2019, Mons, Belgium

Linköping Electronic Conference Proceedings 158:9, s. 79-85

NEALT Proceedings Series 37:9, p. 79-85

Visa mer +

Publicerad: 2019-06-12

ISBN: 978-91-7685-087-9

ISSN: 1650-3686 (tryckt), 1650-3740 (online)

Abstract

This paper lays out the course design for, and teaching experiences with, a class that introduces students in the humanities to the history of cryptology, with particular attention to film and media studies. The course covers principles of secret communication from ancient times to the 2 I81 century, and encourages students to develop creative solutions that may help portray computing, computer networks, and cybersecurity issues in more informed and accurate ways on screen.

Nyckelord

Cryptology Film Cinema Television History Pedagogy Cybersecurity

Referenser

James Bamford. 1982. The Puzzle Palace: Inside the National Security Agency. Penguin, New York.

Craig P Bauer. 2013. Secret History: The Story of Cryptology. CRC Taylor & Francis, Boca Raton.

Craig P Bauer. 2017. Unsolved! The History and Mystery of the World’s Greatest Ciphers from Ancient Egypt to Online Secret Societies. Princeton University Press, Princeton NJ.

Friedrich L Bauer. 2007. Decrypted Secrets: Methods and Maxims of Cryptology. Springer, Berlin.

Raymond Clemens. 2016. The Voynich Manuscript. Yale University Press, Yale CT.

Whitfield Diffie and Susan Landau, 2007. Privacy on the Line: The Politics of Wiretapping and Encryption, MIT Press, Cambridge MA.

Darren Glass. 2013. "A First-Year Seminar on Cryptography", Cryptologia, 37:4, 305-310

David Kahn. 1967. The Codebreakers - The Story of Secret Writing. Macmillan, New York.

Michael Kackman. 2005. Citizen Spy: Television, Espionage, and Cold War Culture. University of Minnesota Press, Minneapolis.

Manmohan Kaur. 2008. "Cryptography as a Pedagogical Tool", PRlMUS vl8 n2 (March 2008), 198-206

Neal Koblitz. 1997. "Cryptography as a Teaching Tool," Cryptologia 21 :317-326.

Neal Koblitz, 2010. "Secret Codes and Online Security: A Seminar for Entering Students," Cryptologia, 34:145-154

Lorelei Koss. 2014. "Writing and Information Literacy in a Cryptology First-Year Seminar," Cryptologia 38:223-231

Yesem Kurt. 2010. Deciphering an Undergraduate Cryptology Course, Cryptologia, 34:2, 155-162

Stephen Levy. 2001. Crypto. Penguin Books, London

Kirstie Macrakis. 2014. Prisoners, Lovers, and Spies: The Story of Invisible Ink from Herodotus to a/Qaeda.Yale University Press, Yale CT.

National Cryptologic Museum Foundation. https://cryptologicfoundation.org

Pew Research Center: Americans and Cybersecurity https://www.pewintemet.org/2017/01/26/americans-and-cybersecurity/

Pew Research Center Cybersecurity Quiz, 2017 https://www.pewintemet.org/ quiz/cybersecurityknowledge/

Klaus Schmeh. 2015. List of Encrypted Books. http://scienceblogs.de/klausis-kryptokolumne/

klaus-schmehs-list-of-encrypted-books/Simon Singh. 1999. The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. Anchor Books, New York.

Bruce Schneier. 2004. Secrets and Lies. Digital Security in a Networked World Wiley, Indianapolis.

Jean-Jacques Quisquater et al. 1990. "How to Explain Zero-Knowledge Protocols to your Children", in G Brassard ed., Advances in Cryptology - Crypto 89. LNCS 435, pp 628-631.

Brian Winkel. 2008. Lessons Learned from a Mathematical Cryptology Course, Cryptologia, 32:1, 45-55

Citeringar i Crossref