The Interface 

Commentaries on Economics and Science

Krisharni B.

Blog Posts

Nanotechnology: More harm than good?

Nanotechnology: More harm than good?

In February, NewScientist released an article explaining the intention of researchers to use locusts as bomb sniffers. Of course, locusts have not evolved to detect bombs and certainly do not have the capability to directly communicate to scientists of their findings. However, locusts do have the ability to identify specific smells, a characteristic enhanced if locusts travel in swarms. To utilise this trait, scientists got creative: the article by NewScientist explains how researchers plan to hijack the olfactory system of locusts by attaching biosensors to analyse the neurons being fired when these locusts are placed in a target location. There are several implications of this research. For instance, it isn’t new to us to understand that all tools can be used as weapons, in this case, using the characteristics of locusts to discover ways bombs can go undetected. However, another implication is the use of living organisms as ‘tools’. A commentary by MedicalDiscoveryNews on this research points out that locusts are great for this job as they are “disposable and inexpensive”. Can the same be said of a human?

Krisharna B.
Krisharna B.

Cryptography: Encryption vs Decryption, which will be the victor?

Cryptography: Encryption vs Decryption, which will be the victor?

Encryption does not only involve unscrambling information. In order to access its contents, the person intercepting the message should first have the key. One of the earliest forms of encryption is the scytale device used by ancient Spartians to relay war commands secretly. The scytale delivers messages by wrapping a strip of leather around a uniquely shaped wooden rod only known by the intended recipient. When unwrapped only an anagram with meaningless letters are observed, this is the idea behind ciphertext. However, since no lock ever remains unpicked, the frequency analysis system which Islamic scholars used to unravel the Quran was able to piece together cryptography methods such as the scytale device. Frequency analysis relies on the statistical frequency of a letter within a language. For instance, in 2020, ‘E’ is recorded to appear in 10.98% of words, ‘I’ in 9.08% and S in 8.89%. Hence the Islamic scholars would assume that the most common letter in an encrypted message would be E. However, this method of decryption does have its weaknesses. The message “yacht and xylophones” contains the least frequent letters ‘y’ and ‘x’. The caesar cypher relies on shifting letters to infrequent ones with a key code agreed between the sender and recipient. This ultimately started the perpetual battle between encryption and decryption.

Krisharna B.
Krisharna B.

Tags