Mathematicians Ben Green and Mehtaab Sawhney have developed a new counting technique for prime numbers, utilizing tools from additive combinatorics like Gowers norms to explore the distribution of primes, specifically those fitting the form p² + 4q².
This article details a project where an Enigma machine replica was built using modern technologies like custom PCBs and 3D printed parts. The initial build faced issues with mechanical wear on the rotor contacts (pogo pins), leading to a redesign exploring alternative position detection methods like IR sensors, rotary encoders, and Hall-effect sensors to improve reliability.
It has been shown that cyclic redundancy checks with
known generator polynomials should not be used to verify
the integrity when someone can alter the data between its
source and destination and can obtain the original CRC
values. Two solutions are to keep the polynomial used to
create the CRC secret 9 » or to incorporate some secret
value into the CRC that is unknown to the adversary as in
HMAC-SHA1 or HMAC-MD5 10 » . A hash function
such as MD5 or SHA1 may be a better choice to verify
integrity of data. One-way hashes are mathematical
functions that produce a relatively unique value for a
particular message.