試す 金 - 無料
SageMath: A Second Glance at Cybersecurity
Open Source For You
|January 2025
The eighth article in the series on SageMath explores a classical encryption scheme called the Rail Fence cipher and introduces the concept of symmetric-key encryption.
In the previous article in this SageMath series (published in the November 2024 issue of OSFY), we began exploring cybersecurity and introduced classical encryption techniques, setting a foundation for further discussion. In this article, we delve into a classical encryption scheme known as the Rail Fence cipher. Unlike the Caesar and Vigenère ciphers we covered earlier—both of which are substitution ciphers that replace each plaintext letter with another to create the ciphertext—the Rail Fence cipher is a transposition cipher. Here, letters in the plaintext are rearranged rather than substituted, producing a scrambled version of the plaintext to form the ciphertext. Notice that any terms introduced without explanation here were discussed in the previous article.
Before proceeding further, we need to focus on two additional aspects as we progress in this series, beyond discussing SageMath code. First, we need to set up effective tools for working with SageMath. Second, we should explore the historical context of our topic: cybersecurity and cryptography.
Let us start by addressing a tool-related issue. So far, we have been using an online platform called CoCalc, a web-based tool well-suited for running SageMath programs. However, CoCalc operates on a freemium model, requiring payment for certain features. While I am not an ardent advocate of exclusively using free and open source software, I initially recommended CoCalc for its accessibility. Since SageMath has a steep learning curve, I thought it would be beneficial for those new to it to quickly access an online tool rather than navigate the challenges of installing it on their preferred operating system. However, it is now time to explore alternative tools and options beyond CoCalc.
Installing and using SageMath on your computer
このストーリーは、Open Source For You の January 2025 版からのものです。
Magzter GOLD を購読すると、厳選された何千ものプレミアム記事や、10,000 以上の雑誌や新聞にアクセスできます。
すでに購読者ですか? サインイン
Open Source For You からのその他のストーリー
Open Source For You
Top 10 Open Source Tools for System and IT Administrators
All reputed online services have committed system and IT administrators working behind the scenes. Here are ten open source tools they should be aware of, as these can help them monitor, automate, as well as manage complex infrastructure with relative ease.
6 mins
February 2026
Open Source For You
Google opens access to its Gemini Deep Research Agent
Google has opened access to its Gemini Deep Research Agent for the first time, allowing developers to integrate advanced autonomous research capabilities directly into their applications.
1 min
February 2026
Open Source For You
NVIDIA buys SchedMD, keeps Slurm open source and vendor neutral
NVIDIA has acquired AI software company SchedMD, signalling a deeper commitment to open source technologies as competition intensifies across the artificial intelligence ecosystem.
1 min
February 2026
Open Source For You
How Open Source Tools Power Modern IT Operations
Open source tools have not replaced enterprise IT platforms; they have become the connective layer that makes modern operations possible.
6 mins
February 2026
Open Source For You
Mandiant's Auralnspector enhances Salesforce security
Google-owned cybersecurity firm Mandiant has released AuraInspector, a free, open source command-line tool designed to identify dangerous access control misconfigurations in Salesforce environments, marking a significant move to democratise enterprise-grade security testing.
1 min
February 2026
Open Source For You
Google launches Universal Commerce Protocol to power agentic AI commerce
Google has introduced the Universal Commerce Protocol (UCP), a new open standard that enables AI agents to autonomously perform end-to-end commerce activities, spanning product discovery, purchasing, checkout, payments, and postpurchase experiences.
1 min
February 2026
Open Source For You
Zero Trust CI/CD: The Death of Static Secrets
In an era where data breach costs continue to hit record highs, shifting to a secretless CI/CD pipeline is the most effective step to safeguard digital infrastructure.
7 mins
February 2026
Open Source For You
Quantum Algorithms: The Future of Computing
Explore the essence of quantum algorithms, their groundbreaking applications, recent innovations, and the challenges that remain.
8 mins
February 2026
Open Source For You
Bringing Clarity to the Chaos in AI
AI feels powerful, yet most teams struggle because they cannot define what intelligence they really need. But there are ways to address this challenge.
5 mins
February 2026
Open Source For You
Top researchers return to OpenAI
OpenAI has welcomed back three high-profile researchers, Barret Zoph, Luke Metz, and Sam Schoenholz, following their brief tenure at former OpenAI CTO Mira Murati's AI startup, Thinking Machines.
1 min
February 2026
Listen
Translate
Change font size
