Expertise As an Object: an Ontological Study of Cryptology Research in the United Kingdom from 1970 to 2000

Total Page:16

File Type:pdf, Size:1020Kb

Expertise As an Object: an Ontological Study of Cryptology Research in the United Kingdom from 1970 to 2000 UNIVERSITY OF SURREY Expertise as an Object: An Ontological Study of Cryptology Research in the United Kingdom from 1970 to 2000 by Richard Fletcher Submitted for the degree of Doctor of Philosophy Faculty of Arts and Human Sciences Department of Sociology Supervisors: Dr Christine Hine and Dr Nicola Green ©Richard Fletcher Words: 95,698 Declaration of Authorship This thesis and the work to which it refers are the results of my own efforts. Any ideas, data, images or text resulting from the work of others (whether published or unpublished) are fully identified as such within the work and attributed to their originator in the text, bibliography or in footnotes. This thesis has not been submitted in whole or in part for any other academic degree or professional qualification. I agree that the University has the right to submit my work to the plagiarism detection service TurnitinUK for originality checks. Whether or not drafts have been so-assessed, the University reserves the right to require an electronic version of the final document (as submitted) for assessment as above. Signature: Date: i \Quis custodiet ipsos custodes?" Juvenal (Satire VI, lines 347-8) Abstract Recent research carried out under the `third wave of science studies' has produced robust categories of expertise, and has developed normative ideas about how it should be used during controversies over technological decision-making. Though separate in the literature, third wave ideas about contributory expertise appear to be compatible with the recent `turn to ontology'. Both sets of ideas focus on what it is that practices are able to produce, and consider the results of those practices to be real. It is argued here that contributory expertise can usefully be treated as an `object' under the ontological framework, thus placing additional analytical focus on the practices that are used to enact it. To explore this idea, documentary analysis and qualitative interviews have been used to produce a description of cryptology research and the crypto wars in the United Kingdom from 1970 to 2000. The cryptology research carried out at four research sites will be described. It is argued that, given divergence amongst the institutional research practices used at each site, the contributory cryptology ex- pertises enacted during this period were `multiple', and can be identified as such using sociological discrimination. A description of how these expertises were then used during the crypto wars - a subsequent controversy over the regulation and use of cryptography in the 1990s - is also provided. It is argued that, as a consequence of this multiplicity, expertises were used during the crypto wars in different ways and for different purposes. In particular, the consequences of basing political deci- sions on expertise enacted in secret are described. It is argued that acknowledging multiplicity amongst contributory expertise could be used to improve the applica- tion of `elective modernism', and to refine its core tenets through the application of a `Minimum Transfer Requirement' and the identification of the `problem of expert discrimination'. Acknowledgements I would like to extend my gratitude to my supervisors, Christine Hine and Nicola Green, for their excellent supervision over the course of the last four years. I'd like to thank them for their patience in letting me figure where my ideas were leading, for allowing me to draw on their extensive knowledge of the Science and Technology Studies literature, and for their invaluable help in preparing for preparing research papers and conference presentations. I would also like to extend my gratitude to all of my interviewees for being generous and helpful with their time, and for sharing their memories with me. Similarly, I would like to thank all of the archivists for their help in tracking down the relevant sources. I would like to thank all of the other members of staff in the Department of Sociol- ogy at the University of Surrey for providing a unique and inspiring environment for doctoral research. In particular, I would like to thank Kate Burningham, Rachel Cohen and Rob Meadows for allowing me to teach on their undergraduate Research Methods modules. Special thanks also go to Geoff Cooper for allow- ing me to have the first pick of his vast collection of academic books upon his retirement. I would also like to thank all of the administrative staff for making everything run so smoothly. I am also grateful for the stimulating and enlivening presence of my fellow doctoral students in the Department of Sociology. In particular, I would like to thank Peter Johnson for his enthusiasm for discussing social research, his willingness to collaborate with me on a separate project, and most importantly, for driving us both from London to Guildford on a regular basis. I would also like sincerely thank friends and housemates past and present for their support and motivation over the course of the last four years. Although it probably didn't seem like you were helping me complete my research - you were. Special thanks, of course, go to Clemy Walker. Finally, I would like to thank the Economic and Social Research council for gener- ously providing the three years' worth of funding that made the research possible. iv Contents Declaration of Authorship i Abstract iii Acknowledgements iv List of Figures x List of Tables xi Abbreviations xii 1 Introduction 1 1.1 Controversies and Expertise . 1 1.2 Cryptology and the Crypto Wars . 6 1.2.1 Why Cryptology and the Crypto Wars? . 7 1.2.2 The History of Cryptology . 10 1.2.3 Public-Key Cryptography . 11 1.2.4 The Literature on the Crypto Wars . 13 1.3 Research Questions and Answers . 20 1.4 Chapter Guide . 23 2 Literature Review 28 2.1 Introduction . 28 2.2 Expertise and Controversies over Technological Decision-Making . 28 2.2.1 What is a Controversy? . 29 2.2.2 Controversies and the Sociology of Scientific Knowledge . 31 2.2.3 Controversies and the Sociology of Technology . 32 2.2.4 Ways of Understanding Controversies . 34 2.2.5 Controversies over Technological Decision-Making . 39 2.2.6 The Third Wave of Science Studies . 42 2.2.7 The Periodic Table of Expertise . 46 v Contents vi 2.2.8 Specialist Expertise . 49 2.2.9 Elective Modernism . 51 2.2.10 Meta-Expertise . 57 2.2.11 Criticisms of Elective Modernism . 58 2.2.12 Summary . 60 2.3 The Ontological Framework . 61 2.3.1 The Epistemological Framework . 62 2.3.2 Ontological Fluidity . 63 2.3.3 Ontological Multiplicity . 65 2.3.4 Developing the Ontological Framework . 66 2.3.5 Criticisms of the Ontological Framework . 70 2.3.6 Summary . 73 2.4 Conclusion . 73 3 Methodology 77 3.1 Introduction . 77 3.2 Methodological Background . 77 3.2.1 Case Study . 78 3.2.2 Historical Methods . 82 3.3 Data Gathering . 85 3.3.1 Research Design . 85 3.3.2 Documentary Analysis . 87 3.3.3 Practicalities of Documentary Analysis . 90 3.3.4 Semi-Structured Interviewing . 92 3.3.5 Practicalities of Semi-Structured Interviewing . 96 3.3.6 A Note on Ethics . 100 3.4 Conclusion . 100 4 Cryptology Research at the National Physical Laboratory 103 4.1 Introduction . 103 4.2 Historical Overview of NPL . 104 4.2.1 Early Computing Research . 106 4.2.2 New Public Management . 108 4.3 The Data Security Group . 112 4.3.1 Cryptology Standards . 113 4.3.2 Later Governance of NPL . 116 4.3.3 Testing and Accreditation . 119 4.4 Conclusion . 122 5 Cryptology Research at Royal Holloway 123 5.1 Introduction . 123 5.2 Historical Overview of the University of London . 124 5.3 Historical Overview of Racal . 126 5.3.1 Early Years . 127 5.3.2 Development of Communications Security Products . 128 Contents vii 5.3.3 Enlisting Cryptology Expertise . 129 5.4 Historical Overview of Royal Holloway . 131 5.5 The Information Security Group . 133 5.5.1 Formation . 133 5.5.2 Early Cryptology Research and Industrial Collaboration . 135 5.5.3 Teaching . 137 5.6 Conclusion . 138 6 Cryptology Research at the University of Cambridge 140 6.1 Introduction . 140 6.2 Historical Overview of the Cambridge Computer Laboratory . 141 6.2.1 The Roots of Computing Research . 141 6.2.2 Formation . 142 6.2.3 Early Computer Development . 144 6.3 Computer Security and Cryptology Research . 145 6.3.1 Early Cryptology and Computer Security Research . 147 6.3.2 The Security Group . 148 6.3.3 Cryptology and Security Systems . 150 6.4 Conclusion . 152 7 Cryptology Research at the Government Communications Head- quarters 154 7.1 Introduction . 154 7.2 The UK's Intelligence Organizations . 155 7.3 Historical Overview of GCHQ . 157 7.4 The Communications-Electronics Security Group . 160 7.4.1 Formation . 160 7.4.2 Research on Non-Secret Encryption . 162 7.4.3 Increased Public Awareness . 166 7.4.4 Public Role . 168 7.4.5 Continued Secrecy . 169 7.5 Conclusion . 170 8 The Political Phase of the Crypto Wars 173 8.1 Introduction . 173 8.1.1 A Note on Organization . 174 8.2 The Debate over Trusted Third Parties . 175 8.2.1 Background . 175 8.2.2 The Announcement of the TTP Proposals . 178 8.2.3 The First Stage of Consultation . 188 8.2.4 The Second Stage of Consultation . 197 8.2.5 The End of the TTP Debate . 203 8.3 The Debate over Export Controls . 205 8.3.1 The Background . 206 8.3.2 The Announcement of the Export Control Proposals . 208 Contents viii 8.3.3 The Consultation Process .
Recommended publications
  • University Microfilms International 300 North Zeeb Road Ann Arbor, Michigan 48106 USA St
    ISOLATION AND COMMUNITY: THE THEME AND FORM OF WILLIAM MORRIS' POETRY AND PROSE Item Type text; Dissertation-Reproduction (electronic) Authors Balch, Dennis Robert, 1949- Publisher The University of Arizona. Rights Copyright © is held by the author. Digital access to this material is made possible by the University Libraries, University of Arizona. Further transmission, reproduction or presentation (such as public display or performance) of protected items is prohibited except with permission of the author. Download date 09/10/2021 07:25:50 Link to Item http://hdl.handle.net/10150/289550 INFORMATION TO USERS This material was produced from a microfilm copy of the original document. While the most advanced technological means to photograph and reproduce this document have been used, the quality is heavily dependent upon the quality of the original submitted. The following explanation of techniques is provided to help you understand markings or patterns which may appear on this reproduction. 1.The sign or "target" for pages apparently lacking from the document photographed is "Missing Page(s)". If it was possible to obtain the missing page(s) or section, they are spliced into the film along with adjacent pages. This may have necessitated cutting thru an image and duplicating adjacent pages to insure you complete continuity. 2. When an image on the film is obliterated with a large round black mark, it is an indication that the photographer suspected that the copy may have moved during exposure and thus cause a blurred image. You will find a good image of the page in the adjacent frame. 3. When a map, drawing or chart, etc., was part of the material being photographed the photographer followed a definite method in "sectioning" the material.
    [Show full text]
  • A Comparitive Study of Asymmetric Key Cryptography
    Vol-5 Issue-3 2019 IJARIIE-ISSN(O)-2395-4396 A COMPARITIVE STUDY OF ASYMMETRIC KEY CRYPTOGRAPHY Dr. Prashant P. Pittalia Associate Professor, Department of Computer Science, Gujarat, India ABSTRACT Cryptography is use to secure the computer networks. Cryptography converts the plain text into cipher text such a way that it is impossible for intruders to read and understand the content. Asymmetric key cryptography is based on the public key and private key concepts to support the confidentiality and authentication services in computer networks. This paper describes how confidentiality and authentication service provides by asymmetric key algorithms. In this paper the discussion and comparison of a asymmetric key algorithms like RSA, Diffie-Hellman, ElGamal and ECC. Keyword: - RSA, Authentication, Public key, Private Key, Confidentiality 1. INTRODUCTION Today in global village the internet security is the challenging aspect and cryptography is used for it. Cryptography is the mathematical techniques of information security. It supports confidentiality, privacy, and data integrity and entity authentication. Cryptography systems classified into two main categories symmetric-key cryptography that use a symmetric key used by both sender and recipient and a public-key cryptography that use two keys, a public key known to everyone in the network and a private key that is used by only the recipient of the messages. Symmetric algorithms use the same secret key for both encryption of plaintext and decryption of cipher text. The keys may be same or there may be an easy transformation to go between the two keys. The key is shared between the two parties (sender and receiver) who want to communicate.
    [Show full text]
  • Varieties of Emergence
    See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/228792799 Varieties of emergence Article · January 2002 CITATIONS READS 37 94 1 author: Nigel Gilbert University of Surrey 364 PUBLICATIONS 9,427 CITATIONS SEE PROFILE Some of the authors of this publication are also working on these related projects: Consumer Behavior View project Agent-based Macroeconomic Models: An Anatomical Review View project All content following this page was uploaded by Nigel Gilbert on 19 May 2014. The user has requested enhancement of the downloaded file. 1 VARIETIES OF EMERGENCE N. GILBERT, University of Surrey, UK* ABSTRACT** The simulation of social agents has grown to be an innovative and powerful research methodology. The challenge is to develop models that are computationally precise, yet are linked closely to and are illuminating about social and behavioral theory. The social element of social simulation models derives partly from their ability to exhibit emergent features. In this paper, we illustrate the varieties of emergence by developing Schelling’s model of residential segregation (using it as a case study), considering what might be needed to take account of the effects of residential segregation on residents and others; the social recognition of spatially segregated zones; and the construction of categories of ethnicity. We conclude that while the existence of emergent phenomena is a necessary condition for models of social agents, this poses a methodological problem for those using simulation to investigate social phenomena. INTRODUCTION Emergence is an essential characteristic of social simulation. Indeed, without emergence, it might be argued that a simulation is not a social simulation.
    [Show full text]
  • Current Affairs 2013- January International
    Current Affairs 2013- January International The Fourth Meeting of ASEAN and India Tourism Minister was held in Vientiane, Lao PDR on 21 January, in conjunction with the ASEAN Tourism Forum 2013. The Meeting was jointly co-chaired by Union Tourism Minister K.Chiranjeevi and Prof. Dr. Bosengkham Vongdara, Minister of Information, Culture and Tourism, Lao PDR. Both the Ministers signed the Protocol to amend the Memorandum of Understanding between ASEAN and India on Strengthening Tourism Cooperation, which would further strengthen the tourism collaboration between ASEAN and Indian national tourism organisations. The main objective of this Protocol is to amend the MoU to protect and safeguard the rights and interests of the parties with respect to national security, national and public interest or public order, protection of intellectual property rights, confidentiality and secrecy of documents, information and data. Both the Ministers welcomed the adoption of the Vision Statement of the ASEAN-India Commemorative Summit held on 20 December 2012 in New Delhi, India, particularly on enhancing the ASEAN Connectivity through supporting the implementation of the Master Plan on ASEAN Connectivity. The Ministers also supported the close collaboration of ASEAN and India to enhance air, sea and land connectivity within ASEAN and between ASEAN and India through ASEAN-India connectivity project. In further promoting tourism exchange between ASEAN and India, the Ministers agreed to launch the ASEAN-India tourism website (www.indiaasean.org) as a platform to jointly promote tourism destinations, sharing basic information about ASEAN Member States and India and a visitor guide. The Russian Navy on 20 January, has begun its biggest war games in the high seas in decades that will include manoeuvres off the shores of Syria.
    [Show full text]
  • The World's Show, 1851, Or, the Adventures of Mr. and Mrs
    I < ' ' 6 i-o / Digitized by the Internet Archive in 2017 with funding from Getty Research Institute https://archive.org/details/worldsshow1851or00mayh ^0 mt (S’SS.m : on -n ft mrnfrTTTK^LLuj *t^P^YfTYfTTfM TTTTTjif 111 Hli)HOR, IthfAdvInturesvi V AND M TS SANDBOYS AND FAMILY,, ;0 CAME UP TO TOENJOY THEMSEEVEiS. AND TO SEE THE GREAT BY HENMYMA¥H E.W/MEDI GEORCECrUBCS MANIC. LONDON: GEORGE NEWBOLD, 303 & 304, STRAND, Vv.C. — LIST OF ILLUSTRATIONS DESIGNED AND ETCHED BY GEORGE CRUIKSHANK. ALL THE WORLD GOING TO THE GREAT EXHIBITION Frontispiece LOOKING FOR LODGINGS 54 LONDON CRAMMED AND MANCHESTER DESERTED 2 PLATES . 59 THE OPERA BOXES DURING THE TIME OF THE GREAT EXHIBI- TION 117 THE OPENING OF THE GREAT BEE-HIVE 136 THE FIRST SHILLING DAY 153 SOME OF THE DROLLERIES OF THE GREAT EXHIBITION ... 160 ODDS AND ENDS, IN, OUT, AND ABOUT THE GREAT EXHIBITION . 162 DISPERSION OF THE WORKS OF ALL NATIONS 238 ludia Proof impressions of the above Ten Plates may be had, all printed on paper of uniform size (23^ by 17^ inches), quite perfect, and free from folds, price 15s. per set. ENGRAVINGS. THE CHEAPEST HOUSE FOR ENGRAVINGS OF EVERY DESCRIPTION is GEORGE NEWBOLD’S, 303 & 304, STRAND, LONDON, W.C. (back of st. mart’s chukch.) A Clearance Sale Catalogue, 54 Svo pp., Post Free on receipt of Four Stamps. ; ; 1851 : OB, THE ADVENTURES OF MR. AND MRS. CURSTY SANDBOYS. CHAPTER I. ‘ 1 Come, Nicliol, and gi’e us thy cracks, I seed te gang down to the smiddy, I’ve fodder’d the naigs and—the nowt, And wanted to see thee ’at did e.
    [Show full text]
  • The Internet ! Based on Slides Originally Published by Thomas J
    15-292 History of Computing The Internet ! Based on slides originally published by Thomas J. Cortina in 2004 for a course at Stony Brook University. Revised in 2013 by Thomas J. Cortina for a computing history course at Carnegie Mellon University. A Vision of Connecting the World – the Memex l Proposed by Vannevar Bush l first published in the essay "As We May Think" in Atlantic Monthly in 1945 and subsequently in Life Magazine. l "a device in which an individual stores all his books, records, and communications, and which is mechanized so that it may be consulted with exceeding speed and flexibility" l also indicated the idea that would become hypertext l Bush’s work was influential on all Internet pioneers The Memex The Impetus to Act l 1957 - U.S.S.R. launches Sputnik I into space l 1958 - U.S. Department of Defense responds by creating ARPA l Advanced Research Projects Agency l “mission is to maintain the technological superiority of the U.S. military” l “sponsoring revolutionary, high-payoff research that bridges the gap between fundamental discoveries and their military use.” l Name changed to DARPA (Defense) in 1972 ARPANET l The Advanced Research Projects Agency Network (ARPANET) was the world's first operational packet switching network. l Project launched in 1968. l Required development of IMPs (Interface Message Processors) by Bolt, Beranek and Newman (BBN) l IMPs would connect to each other over leased digital lines l IMPs would act as the interface to each individual host machine l Used packet switching concepts published by Leonard Kleinrock, most famous for his subsequent books on queuing theory Early work Baran (L) and Davies (R) l Paul Baran began working at the RAND corporation on secure communications technologies in 1959 l goal to enable a military communications network to withstand a nuclear attack.
    [Show full text]
  • Features of the Internet History the Norwegian Contribution to the Development PAAL SPILLING and YNGVAR LUNDH
    Features of the Internet history The Norwegian contribution to the development PAAL SPILLING AND YNGVAR LUNDH This article provides a short historical and personal view on the development of packet-switching, computer communications and Internet technology, from its inception around 1969 until the full- fledged Internet became operational in 1983. In the early 1990s, the internet backbone at that time, the National Science Foundation network – NSFNET, was opened up for commercial purposes. At that time there were already several operators providing commercial services outside the internet. This presentation is based on the authors’ participation during parts of the development and on literature Paal Spilling is studies. This provides a setting in which the Norwegian participation and contribution may be better professor at the understood. Department of informatics, Univ. of Oslo and University 1 Introduction Defense (DOD). It is uncertain when DoD really Graduate Center The concept of computer networking started in the standardized on the entire protocol suite built around at Kjeller early 1960s at the Massachusetts Institute of Technol- TCP/IP, since for several years they also followed the ogy (MIT) with the vision of an “On-line community ISO standards track. of people”. Computers should facilitate communica- tions between people and be a support for human The development of the Internet, as we know it today, decision processes. In 1961 an MIT PhD thesis by went through three phases. The first one was the Leonard Kleinrock introduced some of the earliest research and development phase, sponsored and theoretical results on queuing networks. Around the supervised by ARPA. Research groups that actively same time a series of Rand Corporation papers, contributed to the development process and many mainly authored by Paul Baran, sketched a hypotheti- who explored its potential for resource sharing were cal system for communication while under attack that permitted to connect to and use the network.
    [Show full text]
  • Nigel Gilbert the Middle
    Simulating social phenomena: the middle way Nigel Gilbert University of Surrey Guildford UK http://cress.soc.surrey.ac.uk Centre for Research in Social Simulation Thursday, June 24, 2010 1 Agents • Distinct parts of a computer program, each of which represents a social actor • Agents may model any actors – Individuals – Firms – Nations – etc. • Properties of agents ✦ Perception ✦ Performance ✦ Policy ✦ Memory 2 Centre for Research in Social Simulation Thursday, June 24, 2010 2 Interaction • Agents are not isolated • Information passed from one agent to another ✦ (coded) Messages ✦ Direct transfer of Knowledge ✦ By-products of action e.g. chemical trails or pheromones ✦ Etc. 3 Centre for Research in Social Simulation Thursday, June 24, 2010 3 Environment • Options: ✦ Geographic space ✦ Analogues to space e.g. knowledge space ✦ Network (links, but no position) • The environment provides ✦ Resources ✦ Communication 4 Centre for Research in Social Simulation Thursday, June 24, 2010 4 An example: modelling the housing market • Hugely important to national economies ✦ in UK, NL, ES, US etc. • Housing in these countries is a major component of personal wealth, as well as just a place to live ✦ affecting consumption, inheritance, mobility etc. • A special market ✦ location important ✦ infrequent purchase ✦ many parties • buyer, seller, • estate agent/realtor, • bank 5 Centre for Research in Social Simulation Thursday, June 24, 2010 5 Previous work IV – Outlook for the UK housing market Introduction Figure 4.1 - Average UK house price 1974Q1-2007Q3 Average UK house price (£) • Mostly econometric models Housing continues to be the UK economy’s 200000 most valuable asset by far. Housing was 180000 ✦ estimated by the Office for National 160000 Statistics to have a total value of £3.9 trillion used to produce quantitative house price 140000 at the end of 2006, equivalent to 60% of the 120000 total value of all UK assets (valued at some 100000 projections £6.5 trillion).
    [Show full text]
  • January 2013
    January1 of 91. 2013 International affairs: US President Barack Obama on 31 January, has come out with his much-awaited comprehensive immigration reforms, that will pave the way for legalization of more than 11 million undocumented immigrants. The reforms, which also propose to eliminate the annual country caps in the employment category, are expected to benefit large number of Indian technocrats and professionals. In a major policy speech on comprehensive immigration in Las Vegas, Obama urged the Congress to act on his proposals. The other key proposals of his "comprehensive" reform plan include "stapling" a green card to the diplomas of science, technology, engineering and mathematics (STEM), PhD and Masters Degree graduates from qualified US universities who have found employment in the country. The President also proposed to create a startup visa for job-creating entrepreneurs. The proposal allows foreign entrepreneurs, who attract financing or revenue from American investors and customers, to start and grow their businesses in the US, and to remain permanently if their companies grow further, create jobs for American workers, and strengthen the economy. The proposal removes the backlog for employment-sponsored immigration by eliminating annual country caps and adding additional visas to the system. Outdated legal immigration programs are reformed to meet current and future demands by exempting certain categories from annual visa limitations, the White House said. Obama also proposed to eliminate existing backlogs in the family-sponsored immigration system by recapturing unused visas and temporarily increasing annual visa numbers. The proposal also raises existing annual country caps from seven per cent to 15 per cent for the family-sponsored immigration system.
    [Show full text]
  • A Nation Goes Online a Nation Goes Online Table of Contents
    A NATION GOES ONLINE A NATION GOES ONLINE TABLE OF CONTENTS Foreword 5 Acknowledgements 6 Introduction 8 Chapter 1 UNCERTAIN BEGINNINGS 12 Chapter 2 NETWORKING TAKES ROOT 24 Chapter 3 A NATIONAL NETWORK (…AT LAST) 45 Chapter 4 CANADA CATCHES UP 60 Chapter 5 THE BIRTH OF CA*NET 90 Chapter 6 FROM CA*NET TO INTERNET 104 Epilogue 128 FOREWORD A NATION GOES ONLINE More Canadians are connected to the Internet than any other country. This should come as no surprise, since we are global leaders in information communications technologies and Internet development. We did not get there by accident – we got there by innovation and establishing world class design expertise. Canada is proud of its advanced networking history. As this publication illustrates, we have built an Internet infrastructure which links Canadians to each other and rein- forces the economic and social underpinnings which define a modern nation. Canada’s networking success is one based on partnership and co-operation between the academic and research community and the public and private sectors. The story told in these pages is a testament to this successful approach. It is not the work of a single group rather that of a series of grass-roots efforts that took shape at universities and other institutions in regions across the country. These pioneers worked to connect a population scattered over immense distances, to create opportunity from potential isolation, and to develop regional collaboration and cohesion. That determination spurred much of the early networking research at Canadian universities and ultimately the national partnerships that led to the creation of CA*net, Canada’s first information highway.
    [Show full text]
  • Resume Nigel Gilbert Sociology, University of Surrey
    Resume Nigel Gilbert Sociology, University of Surrey Professor Nigel Gilbert is Professor of Sociology at the University of Surrey. He has an international reputation as a pioneer in the use of computer simulation in the social sciences and is the author of the principal textbook in that field and many research papers. He is immediate past President of the European Social Simulation Association and founder-editor of the Journal of Artificial Societies and Social Simulation. He has held a personal Chair at Surrey since 1991. From 1997 to 2005, Professor Gilbert was a Pro Vice-Chancellor of the University of Surrey, apart-time post. He had strategic responsibility for staffing matters and was a member of thesenior management team of the University, a chartered institution with a turnover approaching £150 million and 13,000 students. His research interests encompass the sociology of scientific knowledge (understanding howscientists generate reliable knowledge), science policy (strategies for the management of science),and the sociology of the environment, including the management of natural resources such as water. He has written extensively in these areas and is the editor of one of the textbooks on sociological research methods most widely used in UK universities. He has a first degree in Engineering Science from Cambridge. Since graduation, he has aimed to link engineering and the social sciences and his work was honoured with election as a Fellow of the Royal Academy of Engineering in 1999. He is still the only practicing social scientist to be a Fellow of the Royal Academy. He was President of the Engineering Section of the British Association for the Advancement of Science in 2005 and is at present leading a policy group for the Royal Academy on privacy and surveillance.
    [Show full text]
  • Encryption Block Cipher
    10/29/2007 Encryption Encryption Block Cipher Dr.Talal Alkharobi 2 Block Cipher A symmetric key cipher which operates on fixed-length groups of bits, termed blocks, with an unvarying transformation. When encrypting, a block cipher take n-bit block of plaintext as input, and output a corresponding n-bit block of ciphertext. The exact transformation is controlled using a secret key. Decryption is similar: the decryption algorithm takes n-bit block of ciphertext together with the secret key, and yields the original n-bit block of plaintext. Mode of operation is used to encrypt messages longer than the block size. 1 Dr.Talal Alkharobi 10/29/2007 Encryption 3 Encryption 4 Decryption 2 Dr.Talal Alkharobi 10/29/2007 Encryption 5 Block Cipher Consists of two algorithms, encryption, E, and decryption, D. Both require two inputs: n-bits block of data and key of size k bits, The output is an n-bit block. Decryption is the inverse function of encryption: D(E(B,K),K) = B For each key K, E is a permutation over the set of input blocks. n Each key K selects one permutation from the possible set of 2 !. 6 Block Cipher The block size, n, is typically 64 or 128 bits, although some ciphers have a variable block size. 64 bits was the most common length until the mid-1990s, when new designs began to switch to 128-bit. Padding scheme is used to allow plaintexts of arbitrary lengths to be encrypted. Typical key sizes (k) include 40, 56, 64, 80, 128, 192 and 256 bits.
    [Show full text]