• Define cryptography
• Describe hash, symmetric, and asymmetric cryptographic algorithms
• List the various ways in which cryptography is used
With today’s super-fast computers and the advancements in cryptography it would seem that an encrypted message dating back 70 years could easily be broken. However, that proved not to be the case in this fascinating incident.
In 1982, David and Anne Martin were renovating a fireplace that had been sealed off for many years in their 17th-century house in the village of Bletchingley, England. In the chimney, the Martins discovered the remains of a carrier pigeon with a small scarlet ...