The Decline of Unintended Peripheral Knowledge Acquisition

As computer systems continue to enable us to find specific information more efficiently, we’re inherently exposed to less ‘peripheral’ information. That is, information which may loosely relate to the topic searched for, but is not required to answer the question posed. For instance, say I want to find out the …

Read moreThe Decline of Unintended Peripheral Knowledge Acquisition

MD5 Collision Vulnerability: Generating Identical Hash Values From Two Different Computer Programs

Merkle-Damgård Construction

Abstract A common theme for cryptographic hashing algorithms is for them to be created, used, and trusted until a flaw is found, rendering the algorithm no longer cryptographically secure [1]. When such instances occur, many times the deprecated algorithm tends to still be in use, posing a significant security flaw …

Read moreMD5 Collision Vulnerability: Generating Identical Hash Values From Two Different Computer Programs

About Me Part 1

Modded XBox controller schematic

During middle school, I was a huge Call of Duty 4 fan. I was part of a small clan, and would spend most of my weekends ranking up. I looked online for a modded controller, and many were well outside of my price range, with prices ranging from $100 — $200, depending on the features. My next thought was, how hard is it to make a modded controller?