{"id":85,"date":"2006-07-03T16:46:05","date_gmt":"2006-07-03T15:46:05","guid":{"rendered":"http:\/\/security-planet.de\/?p=77"},"modified":"2006-07-03T16:46:05","modified_gmt":"2006-07-03T15:46:05","slug":"kryptographie-gerappt","status":"publish","type":"post","link":"https:\/\/cyber-fi.net\/index.php\/2006\/07\/03\/kryptographie-gerappt\/","title":{"rendered":"Kryptographie, gerappt"},"content":{"rendered":"<p>Rap, oder genauer gesagt &#8220;Gangsta Rap&#8221; mag ja nicht jedermanns Sache sein, aber das St\u00fcck &#8220;Alice and Bob&#8221; von <em>MC Plus+<\/em> sollte man sich auch als &#8220;nicht-Rapper&#8221; mal anh\u00f6ren.<!--more--><\/p>\n<p><em>MC Plus+<\/em> bezeichnet sich als der &#8220;#1 greatest computer science gangsta rapper ever&#8221;, was auch immer das hei\u00dfen mag. Die Idee, die Anwendung der Kryptographie in einem Musikst\u00fcck zu verarbeiten ist aber schon faszinierend.<\/p>\n<p>Das &#8220;Lied&#8221; <a href=\"http:\/\/www.cs.purdue.edu\/homes\/anavabi\/mp3\/MC%20Plus+%20-%20Algorhythms%20-%20Alice%20and%20Bob.mp3\" target=\"_blank\" title=\"MC Plus+ - Alice and Bob\" rel=\"noopener noreferrer\"><em>Alice and Bob<\/em><\/a> ist auf der CD <em>Algorithms<\/em> zu finden, die auf der <a href=\"http:\/\/www.mcplusplus.com\/\" target=\"_blank\" title=\"MC Plus+ and the empty set\" rel=\"noopener noreferrer\">Homepage von <em>MC Plus+<\/em><\/a> auch heruntergeladen werden kann.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Rap, oder genauer gesagt &#8220;Gangsta Rap&#8221; mag ja nicht jedermanns Sache sein, aber das St\u00fcck &#8220;Alice and Bob&#8221; von MC Plus+ sollte man sich auch als &#8220;nicht-Rapper&#8221; mal anh\u00f6ren.<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[2],"tags":[362],"class_list":["post-85","post","type-post","status-publish","format-standard","hentry","category-allgemeines","tag-kryptographie"],"_links":{"self":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/posts\/85","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/comments?post=85"}],"version-history":[{"count":0,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/posts\/85\/revisions"}],"wp:attachment":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/media?parent=85"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/categories?post=85"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/tags?post=85"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}