CS162 Operating Systems and Systems Programming Lecture 25 A

Total Page:16

File Type:pdf, Size:1020Kb

CS162 Operating Systems and Systems Programming Lecture 25 A Recall: Private Key Cryptography CS162 • Private Key (Symmetric) Encryption: – Single key used for both encryption and decryption Operating Systems and • Plaintext: Unencrypted Version of message Systems Programming • Ciphertext: Encrypted Version of message Lecture 25 Plaintext Plaintext Encrypt Decrypt A Touch more Security and Insecure Quantum Computing + IoT Transmission SPY (ciphertext) CIA Key Key December 7th, 2015 • Important properties – Can’t derive plain text from ciphertext (decode) without Prof. John Kubiatowicz access to key http://cs162.eecs.Berkeley.edu – Can’t derive key from plain text and ciphertext – As long as password stays secret, get both secrecy and authentication • Symmetric Key Algorithms: DES, Triple-DES, AES 12/7/15 Kubiatowicz CS162 ©UCB Fall 2015 Lec 25.2 Recall: Public Key Encryption Details Non-Repudiation: RSA Crypto & Signatures • Idea: K can be made public, keep K private public private • Suppose Alice has published public key KE Insecure Channel • If she wishes to prove who she is, she can send a message x encrypted with her private key KD (i.e., Bpublic Bprivate Aprivate Apublic she sends E(x, KD)) – Anyone knowing Alice’s public key KE can recover x, verify that Alice must have sent the message Alice Insecure Channel Bob » It provides a signature • Gives message privacy (restricted receiver): – Alice can’t deny it non-repudiation – Public keys (secure destination points) can be acquired by anyone/used by anyone • Could simply encrypt a hash of the data to sign a – Only person with private key can decrypt message document that you wanted to be in clear text • What about authentication? – Use combination of private and public key • Note that either of these signature techniques work – AliceBob: [(I’m Alice)Aprivate Rest of message]Bpublic perfectly well with any data (not just messages) – Provides restricted sender and receiver – Could sign every datum in a database, for instance • But: how does Alice know that it was Bob who sent her Bpublic? And vice versa… – Need a certificate authority to sign keys! 12/7/15 Kubiatowicz CS162 ©UCB Fall 2015 Lec 25.3 12/7/15 Kubiatowicz CS162 ©UCB Fall 2015 Lec 25.4 RSA Crypto & Signatures (cont’d) Digital Certificate Authorities • How do you know KE is Alice’s public key? • Trusted authority (e.g., Verisign) signs binding I will pay between Alice and KE with its private key KVprivate Bob $500 – C = E({Alice, KE}, KVprivate) – C: digital certificate • Alice: distribute her digital certificate, C • Anyone: use trusted authority’s KVpublic, to extract Alice’s public key from C – D(C, KVpublic) = D(E({Alice, KE}, KVprivate), KVpublic) = {Alice, KE} • Where does someone get KVpublic from? I will pay – Typically compiled into the browser (for instance)! Bob $500 – Can you trust this?? 12/7/15 Kubiatowicz CS162 ©UCB Fall 2015 Lec 25.5 12/7/15 Kubiatowicz CS162 ©UCB Fall 2015 Lec 25.6 Properties of RSA Public Cryptosystems Simple Public Key Authentication • Requires generating large, random prime numbers • Each side need only to know the other side’s public key – Algorithms exist for quickly finding these (probabilistic!) – No secret key need be shared A • Requires exponentiating very large numbers • A encrypts a nonce (random num.) x B – Again, fairly fast algorithms exist – Avoid replay attacks, e.g., • Overall, much slower than symmetric key crypto attacker impersonating client or – One general strategy: use public key crypto to exchange server a (short) symmetric session key • B proves it can recover x, generates » Use that key then with AES or such second nonce y • How difficult is recovering d, the private key? • A can authenticate itself to B in the same way – Equivalent to finding prime factors of a large number • A and B have shared private secrets Notation: E(m,k) – » Many have tried - believed to be very hard on which to build private key! encrypt message m (= brute force only) with key k – We just did secure key distribution! » (Though quantum computers could do so in polynomial time!) • Many more details to make this work securely in practice! 12/7/15 Kubiatowicz CS162 ©UCB Fall 2015 Lec 25.7 12/7/15 Kubiatowicz CS162 ©UCB Fall 2015 Lec 25.8 Summary of Our Crypto Toolkit Putting It All Together - HTTPS • If we can securely distribute a key, then • What happens when you click on https://www.amazon.com? – Symmetric ciphers (e.g., AES) offer fast, presumably strong confidentiality • Public key cryptography does away with • https = “Use HTTP over SSL/TLS” (potentially major) problem of secure key – SSL = Secure Socket Layer distribution – TLS = Transport Layer Security – But: not as computationally efficient » Successor to SSL » Often addressed by using public key crypto to – Provides security layer (authentication, encryption) exchange a session key on top of TCP • Digital signature binds the public key to an entity » Fairly transparent to applications • Public Key Pairs can serve as Identities! – Verified by certificate authority – Or distributed by other techniques 12/7/15 Kubiatowicz CS162 ©UCB Fall 2015 Lec 25.9 12/7/15 Kubiatowicz CS162 ©UCB Fall 2015 Lec 25.10 HTTPS Connection (SSL/TLS) (cont’d) Inside the Server’s Certificate • Browser (client) connects Browser Amazon • Name associated with cert (e.g., Amazon) via TCP to Amazon’s • Amazon’s RSA public key HTTPS server • A bunch of auxiliary info (physical address, type of • Client sends over list of cert, expiration time) crypto protocols it supports • Name of certificate’s signatory (who signed it) • Server picks protocols to • A public-key signature of a hash (SHA-256) of all this use for this session – Constructed using the signatory’s private RSA key, i.e., • Server sends over its – Cert = E(HSHA256(KApublic, www.amazon.com, …), KSprivate)) certificate » KApublic: Amazon’s public key • (all of this is in the clear) » KSprivate: signatory (certificate authority) private key • … 12/7/15 Kubiatowicz CS162 ©UCB Fall 2015 Lec 25.11 12/7/15 Kubiatowicz CS162 ©UCB Fall 2015 Lec 25.12 HTTPS Connection (SSL/TLS) cont’d Administrivia • Midterm 2 grading still continuing Browser Amazon • Browser constructs a random – ETA: very soon. session key K used for data – Have a couple of sub problems still to grade communication – Solutions have been posted – Private key for bulk crypto K • Final Exam • Browser encrypts K using – Friday, December 18th, 2015. Amazon’s public key – 3-6P, Wheeler Auditorium • Browser sends E(K, KA ) public K – All material from the course to server » (excluding option lecture on 12/7) • Browser displays » With slightly more focus on second half, but you are still responsible for all the material • All subsequent comm. encrypted w/ symmetric cipher – Two sheets of notes, both sides (e.g., AES128) using key K – Will need dumb calculator – E.g., client can authenticate using • Targeted review sessions: See posts on Piazza a password – Possibly 3 different sessions focused on parts of course 12/7/15 Kubiatowicz CS162 ©UCB Fall 2015 Lec 25.13 12/7/15 Kubiatowicz CS162 ©UCB Fall 2015 Lec 25.14 Use Quantum Mechanics to Compute? Quantization: Use of “Spin” • Weird but useful properties of quantum mechanics: North – Quantization: Only certain values or orbits are good » Remember orbitals from chemistry??? – Superposition: Schizophrenic physical elements don’t quite Spin ½ particle: Representation: know whether they are one thing or another (Proton/Electron) |0> or |1> • All existing digital abstractions try to eliminate QM – Transistors/Gates designed with classical behavior – Binary abstraction: a “1” is a “1” and a “0” is a “0” • Quantum Computing: Use of Quantization and Superposition to compute. South • Interesting results: • Particles like Protons have an intrinsic “Spin” – Shor’s algorithm: factors in polynomial time! when defined with respect to an external – Grover’s algorithm: Finds items in unsorted database in time magnetic field proportional to square-root of n. • Quantum effect gives “1” and “0”: – Materials simulation: exponential classically, linear-time QM – Either spin is “UP” or “DOWN” nothing between 12/7/15 Kubiatowicz CS162 ©UCB Fall 2015 Lec 25.15 12/7/15 Kubiatowicz CS162 ©UCB Fall 2015 Lec 25.16 Now add Superposition! A register can have many values! • The bit can be in a combination of “1” and “0”: • Implications of superposition: – Written as: = C0|0> + C1|1> – An n-bit register can have 2n values simultaneously! – The C’s are complex numbers! – 3-bit example: 2 2 – Important Constraint: |C0| + |C1| =1 = C000|000>+ C001|001>+ C010|010>+ C011|011>+ • If measure bit to see what looks like, C100|100>+ C101|101>+ C110|110>+ C111|111> 2 – With probability |C0| we will find |0> (say “UP”) • Probabilities of measuring all bits are set by 2 coefficients: – With probability |C1| we will find |1> (say “DOWN”) 2 • Is this a real effect? Options: – So, prob of getting |000> is |C000| , etc. – This is just statistical – given a large number of protons, a – Suppose we measure only one bit (first): 2 2 2 2 2 fraction of them (|C0| ) are “UP” and the rest are down. » We get “0” with probability: P0=|C000| +|C001| +|C010| +|C011| Result: = (C000|000>+ C001|001>+ C010|010>+ C011|011>) – This is a real effect, and the proton is really both things 2 2 2 2 until you try to look at it » We get “1” with probability: P1=|C100| +|C101| +|C110| +|C111| Result: = (C100|100>+ C101|101>+ C110|110>+ C111|111>) • Reality: second choice! • Problem: Don’t want environment to measure – There are experiments to prove it! before ready! – Solution: Quantum Error Correction Codes! 12/7/15
Recommended publications
  • 2011 Steampunk
    2011 Steampunk The age of steam - what discoveries it brings forth! What riches in knowledge and science mankind has attained through the march of progress! We marvel at the potential of the atom, and cower at the power of our machinery. And what of our triumphs? What of the work of Tesla, Watt, Faraday and the Curies? What once was the realm of magicians now becomes the realm of science! What wonders might yet spring forth as we delve deeper and deeper into the magia et mysterium of the world of STEAMPUNK! DO YOU DARE TO LOOK UPON THE VISAGE OF THE UNKNOWN? This year at Clementine Productions’ STEAMPUNK IV event, we do not simply aim to look at what lies on the surface of the wonder that scientific arts have delivered, but to delve deeper, into the possibilities to be found in both the uncanny and the academy! There are those who claim to speak with spirits through machines; others yet who claim to have photographed the immaterial! Is it so hard to believe? We have just unlocked the power of the x-ray and the radiowave. There are those who say that invisibility, teleportation, astral projection and psychic enhancements are lurking but around the corner, Model: Ivana. Photo: Tarik Carroll. Stylist: Berít New York. Jewelry: Dope Designs.Makeup: Jarrett Brandon. Jewelry: Carroll. Stylist: Berít New York. Model: Ivana. Photo: Tarik awaiting the next intrepid scientist who will uncover them! This year we take inspiration from such works as Tim Powers’s Infernal Contraptions and Christopher Priest’s The Prestige.
    [Show full text]
  • Teleportation
    TELEPORTATION ESSAY FOR THE COURSE QUANTUM MECHANICS FOR MATHEMATICIANS ANNE VAN WEERDEN SUPERVISOR DR B.R.U. DHERIN UTRECHT UNIVERSITY JUNE 2010 PREFACE The aim of this essay is to describe the teleportation process in such a way that it will be clear what is done so far, and what is still needed, to develop a teleportation device for humans, which would be my ultimate goal. However much is done already, there are thresholds that still have to be overcome, some of which will need real ingenuity, and others brute computing power, far more than we are now capable of. But I will show why I have confidence that we will reach this goal by describing the astonishing developments in the field of teleportation and the speed with which computing, or technology, evolves. The discovery that teleportation really is possible came about while I was in my thirties, but I was largely unaware of its further developments until I started the research for this essay. Assuming that I am not the only one who did not know, I wrote this essay aimed at people from my age, in their fifties, who, like me, started out without television and computer, I even remember my Mother telling me how she bought a transistor radio for the first time, placed it in a closet and closed the door, just to be amazed that it could still receive signals and play. We saw it all come by, from the first steps on the Moon watched on the television my parents had only bought a few years earlier, I clearly remember asking my Father who, with much foresight, got us out of our beds despite my
    [Show full text]
  • Science Fiction, Steampunk, Cyberpunk
    SCIENCE FICTION: speculative but scientific plausability, write rationally, realistically about alternative possible worlds/futures, no hesitation, suspension of disbelief estrangement+cognition: seek rational understanding of NOVUM (D. Suvin—cognitive estrangement) continuum bw real-world empiricism & supernatural transcendentalism make the incredible plausible BUT alienation/defamiliarization effect (giant bug) Literature of human being encountering CHANGE (techn innovat, sci.disc, nat. events, soc shifts) origins: speculative wonder stories, antiquity’s fabulous voyages, utopia, medieval ISLAND story, scientifiction & Campbell: Hero with a 1000 Faces & Jules Verne, HG Wells (Time Machine, War of the Worlds, The Island of Dr Moreau), Mary Shelley (Frankenstein), Swift Gulliver’s Travels Imaginative, Speculative content: • TIME: futurism, alternative timeline, diff hist. past, time travel (Wells, 2001. A Space Odyssey) • SPACE: outer space, extra-terrestrial adventures, subterranean regions, deep oceans, terra incognita, parallel universe, lost world stories • CHARACTERS: alien life forms, UFO, AI, GMO, transhuman (Invisible Man), mad scientist • THEMES: *new scientific principles, *futuristic technology, (ray guns, teleportation, humanoid computers), *new political systems (post-apocalyptic dystopia), *PARANORMAL abilities (mindcontrol, telekinesis, telepathy) Parallel universe: alternative reality: speculative fiction –scientific methods to explore world Philosophical ideas question limits & prerequisites of humanity (AI) challenge
    [Show full text]
  • Entanglement, Teleportation, and Memory
    QUANTUM INFORMATION TECHNOLOGY: Entanglement, Teleportation, and Memory JeffreyH. Shapiro Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Research Laboratoryof Electronics Laboratoryfor Information and Decision Systems Presented at the Kick-Off Meeting of the ARO/DARPA Quantum Communications & Quantum MemoryInitiative Fort Monmouth, NJ, June 13–14, 2000 QUANTUM INFORMATION TECHNOLOGY: Entanglement, Teleportation, and Memory Massachusetts Institute of Technologyand Northwestern University with Cooperation from the Air Force Research Laboratory A MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE • MIT/NU PROGRAM TEAM – Principal Investigator: J.H. Shapiro (MIT) – MIT: P.L. Hagelstein, S. Lloyd, M.S. Shahriar, M. Sudan, N.C. Wong – NU: P. Kumar, H.P. Yuen – AFRL Cooperation: P.R. Hemmer • MIT/NU PROGRAM ELEMENTS – TELEPORTATION USING SINGLET STATES – QUADRATURE TELEPORTATION USING SOLITONS – THEORETICAL STUDIES QUANTUM INFORMATION TECHNOLOGY: Entanglement, Teleportation, and Memory • TELEPORTATION USING SINGLET STATES – Classical Bits vs. Quantum Qubits – Qubit Teleportation – Long-Distance Quantum Communication System – Ultrabright Narrowband Entanglement Source – Trapped-Atom Quantum Memory – Loss-Limited Throughput/FidelityAnalysis – Compatibilitywith Standard Telecommunication Fiber • TELEPORTATION USING FIELD QUADRATURES – Analog Information: Quadrature Components – Quadrature-Based Teleportation – Quadrature-Based Quantum Repeater Chain – Loss-Limited FidelityAnalysis – Soliton-Based Fiber-Optic
    [Show full text]
  • The Teleportation Accident: a Novel Online
    iZXjl (Mobile ebook) The Teleportation Accident: A Novel Online [iZXjl.ebook] The Teleportation Accident: A Novel Pdf Free Ned Beauman *Download PDF | ePub | DOC | audiobook | ebooks Download Now Free Download Here Download eBook #644356 in Books 2013-11-05 2013-11-05Original language:EnglishPDF # 1 .32 x .99 x 7.42l, .75 #File Name: 1620400235368 pages | File size: 37.Mb Ned Beauman : The Teleportation Accident: A Novel before purchasing it in order to gage whether or not it would be worth my time, and all praised The Teleportation Accident: A Novel: 0 of 0 people found the following review helpful. Very fun, witty irreverentBy RaymondGWI didn't think I would like this book at first. It was very dry in the beginning and didn't seem like it was going to go anywhere. Then it went...all over the place, but in a great and enjoyable way. The attention given to recreating party scenes and realistic dialogue were much appreciated. The characters are very developed, especially the main character whom you can't help but to like even though he's a bit of a hopeless schlub. I liked the way the plot developed and the way that everything eventually comes full circle. It ends pretty much the only way it can and still be true to itself, and when you finish you find that you've gone on a very interesting journey and it's time for a nap.0 of 0 people found the following review helpful. My book group loved this book and we had an active discussionBy DeMy book group loved this book and we had an active discussion.
    [Show full text]
  • Exploring Science Through Science Fiction Series: Science and Fiction
    springer.com Barry B. Luokkala Exploring Science Through Science Fiction Series: Science and Fiction Covers a breadth of topics in the sciences, and draws examples from over 100 years of science fiction film, as well as television Includes an appendix of films cited, with information about the science concepts illustrated by each one Serves as a useful reference for anyone who wants to use examples from sci-fi to illustrate a variety of science concepts Includes numerical examples and solutions referencing many of the cited science fiction sources The material in this book forms the basis of an interdisciplinary, college-level course, which uses science fiction film as a vehicle for exploring science concepts. Unlike traditional 2014, XIX, 241 p. 27 illus., 20 illus. in introductory-level courses, the science content is arranged according to major themes in color. science fiction, with a deliberate progression from the highly objective and discipline-specific (e. g. Reference Frames; Physics of Space Travel and Time Travel) to the very multi-disciplinary eBook and thought-provoking (e.g. Human Teleportation; Science and Society). Over 100 references to 21,39 € | £15.99 | $19.99 science fiction films and television episodes are included, spanning more than 100 years of [2]21,39 € (D) | 21,39 € (A) | CHF cinematic history. Some of these are conducive to calculations (solutions included). 32,00 Available from your library or springer.com/shop MyCopy [3] Printed eBook for just € | $ 24.99 springer.com/mycopy Error[en_EN | Export.Bookseller. MediumType | SE] Order online at springer.com / or for the Americas call (toll free) 1-800-SPRINGER / or email us at: [email protected].
    [Show full text]
  • Collection of Theories
    Collection of Theories Written and Illustrated By: Christopher J. Lechner – Grade 5. Introduction The Collection of Theories provides the reader with the author’s personal hypothesis on Teleportation, Parallel Universes, Magic, and Time. Along with the hypotheses you will also receive insights of the risks and the benefits of these assumptions. These proposals have not been scientifically tested. They are just educated guesses based of scientific facts. The Teleportation Theory The Teleportation theory revolves around how teleportation works. A teleporter is a machine that would separate the molecules of a person, an animal or an item to transport them to a different location. Once arrived to the new location the machine would put the molecules back into its original form. A teleporter would need to be placed at each location where people would like to travel to. The teleporter would require two receivers: one to get into and another one to get out. Sort of like a departure and arrival on a subway. For our current knowledge, even if this theory is correct, using a teleporter would not be able to regenerate memories. Memories are encoded electrical neurons. They are not made of molecules therefore they cannot be transferred through teleportation. Can you imagine if people would have no idea who they are, where they are and how they got there. Quite confusing it is already, isn’t it? You may argue that you can just design the teleporter to transfer memories too. The problem with that argument is that it is not scientifically possible. Even if encoded electrical neurons were transferable to different locations, current science does not have the knowledge yet how to place these neurons back into the same order as they were before, as they would need to be to access our memory.
    [Show full text]
  • Searching for SETI: the Social Construction of Aliens and the Quest for a Technological Mythos
    Searching for SETI: The Social Construction of Aliens and the Quest for a Technological Mythos John Marvin Bozeman Dissertation submitted to the faculty of the Virginia Polytechnic Institute and State University in partial fulfillment of the requirements for the degree of Doctor of Philosophy In Science and Technology Studies Janet A. Abbate, Co-Chair Shannon A. Brown, Co-Chair Lee L. Zwanziger Paul D. Renard March 24, 2015 Falls Church, Virginia Keywords: Search for Extraterrestrial Intelligence, SETI, Actor Network Theory, Social Construction of Technology, Rational Choice Theory of Religion, Transhumanism, Xenosalvation Copyright John M. Bozeman Searching for SETI: The Social Construction of Aliens and the Quest for a Technological Mythos John M. Bozeman ABSTRACT This dissertation uses Actor Network Theory (ANT) and Stark and Bainbridge’s rational choice theory of religion to analyze an established but controversial branch of science and technology, the Search for Extraterrestrial Intelligence (SETI). Of particular interest are the cultural, and sometimes religious, assumptions that its creators have built into it. The purpose of this analysis is not to discredit SETI, but instead to show how SETI, along with other avant-garde scientific projects, is founded, motivated, and propelled by many of the same types of values and visions for the future that motivate the founders of religious groups. I further argue that the utopian zeal found in SETI and similar movements is not aberrant, but instead common, and perhaps necessary, in many early- stage projects, whether technical or spiritual, which lack a clear near-term commercial or social benefit. DEDICATION In memory of my parents, James E.
    [Show full text]
  • EABA Owes a Debt to the Role-Playing Games That Have Gone Before
    OTHER CREDITS: In addition, EABA owes a debt to the role-playing games that have gone before. These may have themselves had inspiration from other role-playing games, but I'm just crediting the ones that inspired me. Dungeons & Dragons®(1974), by Dave Arneson and Gary Gygax, for starting the idea of formal role-playing systems, as well as for some of the most fundamental game mechanics like attributes, skill rolls, and so on. Every role-playing game owes something to Dungeons & Dragons. Champions®(1981), by George MacDonald and Steve Peterson, for internally consistent and intuitive game mechanics, point-based adventurer creation and attribute- based defaults. From beginning as a ™ EABA v1.0 superhero game it has morphed into ©2002 by Greg Porter the Hero System®(1984), a quite good ISBN 0-943891-38-8 universal system. BTRC#6101 Call of Cthulhu®(1981), by Sandy Published by: BTRC Petersen, for making a story-driven P.O. Box 1121 horror system that has taken on a life Collinsville VA 24078 USA of its own. The depth and detail of the [email protected] support material is a benchmark that www.btrc.net all role-playing games should strive for. Cover art: Greg Porter GURPS®(1986), by Steve Jackson, for Interior art: Paul Bourne being the first “universal system” that didn't have a particular genre welded Playtesters: Thomas Bagwell, Marc to it, and for making a strong effort to Carlson, Travis Casey, George Chisum, have rules that matched reality where Damien Dyon, Larry Fries, Viktor Haag, reality was needed. GURPS has more Ian Harac, Stephanie Hostman, William licensed fictional gameworlds than Hostman, Leszek Karlik, Robert Menard, any other role-playing game, and John McMullen, Peter Newman, that it works fairly well for all of them is Charles Reynolds, Bob Ritchey, Sean a testament to the utility of its game Simpson mechanics.
    [Show full text]
  • Read Book Breath of Earth: a Novel Pdf Free Download
    BREATH OF EARTH: A NOVEL PDF, EPUB, EBOOK Beth Cato | 400 pages | 22 Sep 2016 | HarperCollins Publishers Inc | 9780062422064 | English | New York, United States Breath of Earth: A Novel PDF Book And it says its a 1, which means there are plans for a 2! Certainly, I appreciate that authors put their own soul into a work but at the same time, perhaps I just don't find that I like her view of a good romance or character. Now the steampunk side. I don't mind dumb characters except when I'm constantly told that they're not Drives me bonkers! Archived from the original on September 5, He had very little personality to speak of besides being gentlemanly and handsome. No lightness here, just the gritty side of steampunk, xenophobia, violence, and earthquake magic. Ghost Eyes is amazing, Vermilion is good so far, I'm excited about Breath of Earth, and I hope to see a lot more along these lines. Hat off to you, Mr. Surviving also makes them the prime suspects. With all the work gone into the worldbuilding, the plot itself was underwhelming. Hubbard's role as the founder of Scientology has led to a long-running controversy about whether Battlefield Earth contains Scientology themes, and about the role that the Church of Scientology has played in publishing and promoting the book. While she does eventually grow, her naivety and preachy nature made Ingrid an unsatisfactory protagonist for me. White Dwarf Geomancers use their connection to the earth to channel magical energy, siphoning it out of the earth to prevent natural disasters and fuel their own abilities.
    [Show full text]
  • John Sladek Science Fiction and Pseudoscience
    John Sladek Science Fiction and Pseudoscience SCIENCE FICTION AND PSEUDOSCIENCE Copyright © 1972, 2003, the Estate of John Sladek All rights reserved First published in the British Science Fiction Association’s Vector 62, November/December 1972, with the note: “This article is a slightly different version of John Sladek’s speech at the 1972 Speculation Conference. It's mostly copied from Mr Sladek’s written version, supplemented from a tape recorded by Gerald Bishop for the B.S.F.A. Tape Bureau.” The right of the Estate of John Sladek deceased to be identified as the author of this work has been asserted by the Estate in accordance with the Copyright, Designs and Patents Act 1988. NOTICE: This Ansible E-ditions e-book is licensed to the original recipient only. Duplication or distribution to any person by any means is a violation of international copyrig ht law. Published by: Ansible E-ditions 94 London Road Reading Berkshire RG1 5AU United Kingdom [email protected] February 2003 Science Fiction and Pseudoscience John Sladek Some of you may have seen Jonathan Miller’s recent television talk on science fiction. I think I can summ- arize his conclusions in one equation: science fiction equals pseudoscience plus bad writing. (I might add that the only science fiction Dr Miller ever read was in preparing for his talk.) We might similarly summarize Shakespeare’s Julius Caesar as pseudo-history plus good writing, but it doesn’t say anything about the play. Instead, I’d like to unravel science fiction from pseudo- science, and compare the two.
    [Show full text]
  • [Pdf] Physics of the Impossible: a Scientific Exploration Into the World of Phasers, Force Fields, Teleportation, and Time Travel Michio Kaku - Book Pdf Free
    [pdf] Physics Of The Impossible: A Scientific Exploration Into The World Of Phasers, Force Fields, Teleportation, And Time Travel Michio Kaku - book pdf free Michio Kaku epub Physics of the Impossible: A Scientific Exploration into the World of Phasers, Force Fields, Teleportation, and Time Travel, Download pdf Physics of the Impossible: A Scientific Exploration into the World of Phasers, Force Fields, Teleportation, and Time Travel, Download pdf Physics of the Impossible: A Scientific Exploration into the World of Phasers, Force Fields, Teleportation, and Time Travel, Read Best Book Online Physics of the Impossible: A Scientific Exploration into the World of Phasers, Force Fields, Teleportation, and Time Travel, Free Download Physics of the Impossible: A Scientific Exploration into the World of Phasers, Force Fields, Teleportation, and Time Travel Ebooks Michio Kaku, Physics of the Impossible: A Scientific Exploration into the World of Phasers, Force Fields, Teleportation, and Time Travel by Michio Kaku Download, Michio Kaku epub Physics of the Impossible: A Scientific Exploration into the World of Phasers, Force Fields, Teleportation, and Time Travel, Read Best Book Online Physics of the Impossible: A Scientific Exploration into the World of Phasers, Force Fields, Teleportation, and Time Travel, Physics of the Impossible: A Scientific Exploration into the World of Phasers, Force Fields, Teleportation, and Time Travel PDF, Read Physics of the Impossible: A Scientific Exploration into the World of Phasers, Force Fields, Teleportation,
    [Show full text]