An Archeology of Cryptography: Rewriting Plaintext, Encryption, and Ciphertext

Total Page:16

File Type:pdf, Size:1020Kb

An Archeology of Cryptography: Rewriting Plaintext, Encryption, and Ciphertext An Archeology of Cryptography: Rewriting Plaintext, Encryption, and Ciphertext By Isaac Quinn DuPont A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Faculty of Information University of Toronto © Copyright by Isaac Quinn DuPont 2017 ii An Archeology of Cryptography: Rewriting Plaintext, Encryption, and Ciphertext Isaac Quinn DuPont Doctor of Philosophy Faculty of Information University of Toronto 2017 Abstract Tis dissertation is an archeological study of cryptography. It questions the validity of thinking about cryptography in familiar, instrumentalist terms, and instead reveals the ways that cryptography can been understood as writing, media, and computation. In this dissertation, I ofer a critique of the prevailing views of cryptography by tracing a number of long overlooked themes in its history, including the development of artifcial languages, machine translation, media, code, notation, silence, and order. Using an archeological method, I detail historical conditions of possibility and the technical a priori of cryptography. Te conditions of possibility are explored in three parts, where I rhetorically rewrite the conventional terms of art, namely, plaintext, encryption, and ciphertext. I argue that plaintext has historically been understood as kind of inscription or form of writing, and has been associated with the development of artifcial languages, and used to analyze and investigate the natural world. I argue that the technical a priori of plaintext, encryption, and ciphertext is constitutive of the syntactic iii and semantic properties detailed in Nelson Goodman’s theory of notation, as described in his Languages of Art. I argue that encryption (and its reverse, decryption) are deterministic modes of transcription, which have historically been thought of as the medium between plaintext and ciphertext. By developing a new understanding of encryption as standing between two agents, I characterize the process in terms of media. As media, encryption technologies participate in historical desires for commodious and even “angelic” transmission, popular until the twentieth century. I identify how cryptanalysis, or “code-breaking,” is distinct from cryptography, and instead relates to language, being associated with the history of machine translation. Finally, I argue that ciphertext is the perspectival, ordered result of encryption—similar to computation—and resists attempts to be spoken. Since ciphertext resists being spoken, its application problematizes the category of language, and has, at least once in antiquity, been considered a means of creating silence. Tis dissertation is the frst of its kind to ofer a historically-rich, ontological analysis of cryptography, which therefore opens the topic to new felds of scholarship and humanistic forms of inquiry. iv Acknowledgement Many colleagues and friends have given me invaluable assistance and support over the years I worked on this dissertation. My committee, Brian Cantwell Smith, Patrick Keilty, Yuri Takhteyev, and Brett Caraway, has for many years challenged me, supported my work, and provided a haven for intellectual curiosity. I would also like to thank my defence examiners, Anthony Enns and Costis Dallas, who provided exemplary critique and feedback. Tis dissertation is not only the product of my time at the University of Toronto. Without my friends and colleagues at the University of Victoria and Western University I would not have been prepared to undertake this work. Trough these formative years many people have ofered me encouragement and support, especially my undergraduate colleagues in philosophy, and my graduate colleagues in library and information science. I am also thankful to have learned a great deal from my many academic mentors over the years, especially Bill Maurer and Taneli Kukkonen. I am fortunate to have received funding from a SSHRC Doctoral Fellowship, two Ontario Graduate Scholarships, an Enhanced MITACS Accelerate Fellowship, and a Litwin Books Award for Ongoing Doctoral Dissertation Research in the Philosophy of Information. My many friends through the years have been unwavering in their friendship and support, especially Bradley Fidler, Robyn Lee, Clayton Lewis, Sean Rupka, Ashley Scarlett, Hannah Turner, and of course, Rory. My family has always encouraged my intellectual goals, but none more than my sister, Michelle Vingo. I owe my greatest debt of gratitude to Alana Cattapan, to whom this dissertation is dedicated. v Table of Contents 1 Towards ubiquitous cryptography 1 1.1 Defnitions and terminological complexity 7 1.2 Ways of understanding cryptography 13 2 Rewriting cryptography 25 2.1 Conditions of possibility 30 2.2 Technical a priori 32 2.2.1 Mapping the technical a priori of cryptography 33 2.3 Rewriting three schemata: Plaintext, Encryption, and 42 Ciphertext Part One: Plaintext 3 Representation in the fourteenth and ffteenth centuries 49 3.1 Epoch of representation 52 3.2 Mimesis, resemblance, and media 53 3.2.1 Ancient theories of mimesis 54 3.2.1.1 Plato’s theory of mimesis 54 3.2.1.2 Aristotle’s theory of mimesis 57 3.2.2 Te age of resemblances 59 3.2.2.1 Conventia in memory technologies 60 3.2.2.1.1. Ramon Lull, convenientia, and the path to Alberti 63 3.2.2.2 Aemulatio, analogy, and sympathy in Trithemius’ magical 67 cryptography 3.3 Type, notation, and plaintext 76 3.3.1 Te printing press as prototype for a notational epoch 77 3.3.1.1 Te persistence of mimesis 82 3.3.2 Alberti: Notation and plaintext 83 4 Language planning in the sixteenth and seventeenth centuries 90 4.1 Language planning and modernity 93 4.1.1 Francis Bacon’s artifcial languages 97 4.1.1.1 Real Characters 103 4.1.1.2 Bi-literal cipher 106 4.2 Te growth of language planning (1605-1686) 109 5 Notation from the eighteenth to the twenty-frst centuries 122 5.1 Discourse network 1800 125 5.2 Discourse network 1900 128 5.3 Notation and mathematical sciences 130 5.4 Discourse network 2000, and the rise of algorithms 133 5.5 Wither the discourse network? 138 5.6 Notation: A theory of plaintext 144 5.6.1 Te representational violence of notation 153 vi Part Two: Encryption 6 Codes and codeworks 158 6.1 What is code? 159 6.1.1 Umberto Eco’s defnition of code 162 6.1.2 Friedrich Kittler’s defnition of code 163 6.2 Agrippa (A book of the dead) 168 6.2.1 Forensic description of Agrippa 170 6.2.1.1 Te compiled binary 173 6.2.1.2 Te cryptographic algorithm 174 6.2.1.3 Encryption efect 177 6.2.1.4 Te “self-destruct” mechanism 177 7 Media of perception 179 7.1 Te primal scene of cryptography 181 7.2 Perception and encryption 184 7.2.1 Te medial limits of encryption 186 8 Communication and transmission 190 8.1 Te angel in the middle 191 8.2 Encrypted transmissions 195 8.3 From Hermes to Iris 200 9 Translation and transcription 204 9.1 History of the “cryptographic-translation” idea 206 9.2 Language and cryptanalysis 215 9.2.1 Invention of cryptanalysis 216 9.2.2 Early twentieth century cryptanalysis 221 9.3 Transcription and the encryption performance 226 Part Three: Ciphertext 10 Otherness and order 233 10.1 Cryptographic order 235 10.1.1 Te study of order 241 10.1.2 Perspectival ordering 243 10.2 Andrés Ramírez Gaviria: “Between forms of representation 246 and interpretation” 10.2.1 Art at the intersection of code and mimesis 247 10.2.2 Codes and secrecy 253 vii 11 Silence 261 11.1 Te foil: Te skytale is not a cryptographic device 262 11.2 Te argument: Te skytale is a cryptographic device, for 266 silence 11.3 Ontological and phenomenological account of silence 269 11.4 Silent ciphertext 273 12 Epilogue 279 12.1 From money to law to politics 280 12.2 Open secrets 285 Appendix A. Glossary 290 Bibliography 293 viii List of Figures Figure 2.1: Construction of mapping of domains of cryptography, from Kahn’s Codebreakers. Figure 2.2: Redrawn map of domains of cryptography, from Zielinski’s Deep Time of the Media. Figure 2.3: My mapping of the domains, positivities, and technical a priori of cryptography. Figure 2.4: Diagram of semantics of encryption Figure 3.1: “Visual alphabet” from J.H. von Romberch’s Congestorium Artifciose Memorie (1520). Figure 3.2: First fgure, denoted by A, from Lull’s Ars Brevis (1308/1584). Figure 3.3: Forth fgure, from Lull’s Ars Brevis (1308/1584). Figure 3.4: Cipher wheel from book fve, fgure two of Trithemius’ Polygraphia (1561). Figure 3.5: Codes for invoking the Angel of Saturn, from book three, table three of Trithemius’ Steganographia. Figure 3.6: Setting type in a print shop, from plate 5 of Nova Reperta (c. 1580- 1605). Figures 3.7: Detail of stenographic writing from print edition of Mercury (1641) Figure 3.8: Detail of sound alphabet from print edition of Essay (1668). Figure 3.9: Reconstruction of Alberti’s Descriptio Urbis Romae (c. 1433) mechanism. Figure 3.10: Te rotating horizons of Alberti’s cipher wheel and attached by string, from De cifris (1466). Figure 4.1: Bacon’s “Bi-literate alphabet,” from Of the Advancement and Profciencie of Learning (1623). Figure 4.2: Kircher’s code machine, illustrated in Gaspar Schott’s Organum Mathematicum (1665). Figure 4.3: Wilkins’ system of encryption by Points, Lines, and Figures. Figure 5.1: Figure 4 [vowel resonator] from Tentamen Resolvendi Problema ab Academia Scientiarum Imperiali Petroplitana ad annum 1780 Publice Problema. Figure 5.2: Political cartoon satirizing American universities, from W.E.B. DuBois Club newsletter. Figure 6.1: Contestant Jeremy Cooper’s graphical depiction of the decryption process. Figure 9.1: Shannon’s model of communication. Figure 9.2: Reproduction of al-Kindi’s letter frequency table Figure 9.3: Friedman’s comparison of uniliteral frequency distribution tables ix Figure 9.4: A diagrammatic depiction of the parallel between musical performance and encryption performance.
Recommended publications
  • NSA's Efforts to Secure Private-Sector Telecommunications Infrastructure
    Under the Radar: NSA’s Efforts to Secure Private-Sector Telecommunications Infrastructure Susan Landau* INTRODUCTION When Google discovered that intruders were accessing certain Gmail ac- counts and stealing intellectual property,1 the company turned to the National Security Agency (NSA) for help in securing its systems. For a company that had faced accusations of violating user privacy, to ask for help from the agency that had been wiretapping Americans without warrants appeared decidedly odd, and Google came under a great deal of criticism. Google had approached a number of federal agencies for help on its problem; press reports focused on the company’s approach to the NSA. Google’s was the sensible approach. Not only was NSA the sole government agency with the necessary expertise to aid the company after its systems had been exploited, it was also the right agency to be doing so. That seems especially ironic in light of the recent revelations by Edward Snowden over the extent of NSA surveillance, including, apparently, Google inter-data-center communications.2 The NSA has always had two functions: the well-known one of signals intelligence, known in the trade as SIGINT, and the lesser known one of communications security or COMSEC. The former became the subject of novels, histories of the agency, and legend. The latter has garnered much less attention. One example of the myriad one could pick is David Kahn’s seminal book on cryptography, The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet.3 It devotes fifty pages to NSA and SIGINT and only ten pages to NSA and COMSEC.
    [Show full text]
  • Middleware in Action 2007
    Technology Assessment from Ken North Computing, LLC Middleware in Action Industrial Strength Data Access May 2007 Middleware in Action: Industrial Strength Data Access Table of Contents 1.0 Introduction ............................................................................................................. 2 Mature Technology .........................................................................................................3 Scalability, Interoperability, High Availability ...................................................................5 Components, XML and Services-Oriented Architecture..................................................6 Best-of-Breed Middleware...............................................................................................7 Pay Now or Pay Later .....................................................................................................7 2.0 Architectures for Distributed Computing.................................................................. 8 2.1 Leveraging Infrastructure ........................................................................................ 8 2.2 Multi-Tier, N-Tier Architecture ................................................................................. 9 2.3 Persistence, Client-Server Databases, Distributed Data ....................................... 10 Client-Server SQL Processing ......................................................................................10 Client Libraries ..............................................................................................................
    [Show full text]
  • By Jennifer M. Fogel a Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy
    A MODERN FAMILY: THE PERFORMANCE OF “FAMILY” AND FAMILIALISM IN CONTEMPORARY TELEVISION SERIES by Jennifer M. Fogel A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Communication) in The University of Michigan 2012 Doctoral Committee: Associate Professor Amanda D. Lotz, Chair Professor Susan J. Douglas Professor Regina Morantz-Sanchez Associate Professor Bambi L. Haggins, Arizona State University © Jennifer M. Fogel 2012 ACKNOWLEDGEMENTS I owe my deepest gratitude to the members of my dissertation committee – Dr. Susan J. Douglas, Dr. Bambi L. Haggins, and Dr. Regina Morantz-Sanchez, who each contributed their time, expertise, encouragement, and comments throughout this entire process. These women who have mentored and guided me for a number of years have my utmost respect for the work they continue to contribute to our field. I owe my deepest gratitude to my advisor Dr. Amanda D. Lotz, who patiently refused to accept anything but my best work, motivated me to be a better teacher and academic, praised my successes, and will forever remain a friend and mentor. Without her constructive criticism, brainstorming sessions, and matching appreciation for good television, I would have been lost to the wolves of academia. One does not make a journey like this alone, and it would be remiss of me not to express my humble thanks to my parents and sister, without whom seven long and lonely years would not have passed by so quickly. They were both my inspiration and staunchest supporters. Without their tireless encouragement, laughter, and nurturing this dissertation would not have been possible.
    [Show full text]
  • (SMC) MODULE of RC4 STREAM CIPHER ALGORITHM for Wi-Fi ENCRYPTION
    InternationalINTERNATIONAL Journal of Electronics and JOURNAL Communication OF Engineering ELECTRONICS & Technology (IJECET),AND ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 6, Issue 1, January (2015), pp. 79-85 © IAEME COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) ISSN 0976 – 6464(Print) IJECET ISSN 0976 – 6472(Online) Volume 6, Issue 1, January (2015), pp. 79-85 © IAEME: http://www.iaeme.com/IJECET.asp © I A E M E Journal Impact Factor (2015): 7.9817 (Calculated by GISI) www.jifactor.com VHDL MODELING OF THE SRAM MODULE AND STATE MACHINE CONTROLLER (SMC) MODULE OF RC4 STREAM CIPHER ALGORITHM FOR Wi-Fi ENCRYPTION Dr.A.M. Bhavikatti 1 Mallikarjun.Mugali 2 1,2Dept of CSE, BKIT, Bhalki, Karnataka State, India ABSTRACT In this paper, VHDL modeling of the SRAM module and State Machine Controller (SMC) module of RC4 stream cipher algorithm for Wi-Fi encryption is proposed. Various individual modules of Wi-Fi security have been designed, verified functionally using VHDL-simulator. In cryptography RC4 is the most widely used software stream cipher and is used in popular protocols such as Transport Layer Security (TLS) (to protect Internet traffic) and WEP (to secure wireless networks). While remarkable for its simplicity and speed in software, RC4 has weaknesses that argue against its use in new systems. It is especially vulnerable when the beginning of the output key stream is not discarded, or when nonrandom or related keys are used; some ways of using RC4 can lead to very insecure cryptosystems such as WEP . Many stream ciphers are based on linear feedback shift registers (LFSRs), which, while efficient in hardware, are less so in software.
    [Show full text]
  • Johann Georg Faust
    Johann Georg Faust Dr. Johann Georg Faust (approx. 1480 – 1540) was a German alchemist who was born in the village of Knittlingen, Württemberg (it is also claimed in Roda in the province of Weimar, and also in Helmstadt near Heidelberg in 1466). He has alternatively been known by the names “Johann Sabellicus” and “Georg Faust.” In 1507, Johannes Trithemius of Sponheim wrote that Faust was a con-man and a drifter who preyed on the gullible. He said he had fled a teaching position in Kreuznach after molesting several of the boys there. He may have then gone on to the University of Heidelberg to study, obtaining a degree in divinity from Heidelberg University in 1509, and then to Poland where a friend of Martin Luther, Philip Melanchthon, says Faust studied magic at the University of Kraków. Martin Luther and Philipp Melanchthon are said to have alleged Faust’s companionship with the devil. After that, he appears at the University of Ehrfut in central Germany. It is said that when he lectured on Homer he conjured up Homer’s heroes for his students. He was expelled from Ehrfut by the Franciscan monk Dr. Klinge (who was the cathedral preacher from 1520-1556). Dr. Klinge asked for Faust’s repentance. Faust refused the monk’s offer of intervention and admitted having signed a pact with the Devil, and said that he trusted the Devil more than God. In 1523 he is said to have visited Auerbach’s Tavern in Leipzig where he conjured wine out of a table, and rode a barrel of wine.
    [Show full text]
  • A Practical Attack on Broadcast RC4
    A Practical Attack on Broadcast RC4 Itsik Mantin and Adi Shamir Computer Science Department, The Weizmann Institute, Rehovot 76100, Israel. {itsik,shamir}@wisdom.weizmann.ac.il Abstract. RC4is the most widely deployed stream cipher in software applications. In this paper we describe a major statistical weakness in RC4, which makes it trivial to distinguish between short outputs of RC4 and random strings by analyzing their second bytes. This weakness can be used to mount a practical ciphertext-only attack on RC4in some broadcast applications, in which the same plaintext is sent to multiple recipients under different keys. 1 Introduction A large number of stream ciphers were proposed and implemented over the last twenty years. Most of these ciphers were based on various combinations of linear feedback shift registers, which were easy to implement in hardware, but relatively slow in software. In 1987Ron Rivest designed the RC4 stream cipher, which was based on a different and more software friendly paradigm. It was integrated into Microsoft Windows, Lotus Notes, Apple AOCE, Oracle Secure SQL, and many other applications, and has thus become the most widely used software- based stream cipher. In addition, it was chosen to be part of the Cellular Digital Packet Data specification. Its design was kept a trade secret until 1994, when someone anonymously posted its source code to the Cypherpunks mailing list. The correctness of this unofficial description was confirmed by comparing its outputs to those produced by licensed implementations. RC4 has a secret internal state which is a permutation of all the N =2n possible n bits words.
    [Show full text]
  • Most Popular ■ CORN STALK RUNNER at Flock Together This 2017 TROY TURKEY TROT
    COVERING FREE! UPSTATE NY NOVEMBER SINCE 2000 2018 Flock Together this Thanksgiving ■ 5K START AT 2013 TROY TURKEY TROT. JOIN THE CONTENTS 1 Running & Walking Most Popular ■ CORN STALK RUNNER AT Flock Together this 2017 TROY TURKEY TROT. Thanksgiving! 3 Alpine Skiing & Boarding Strutting Day! Ready for Ski Season! By Laura Clark 5 News Briefs 5 From the Publishers hat I enjoy most about Thanksgiving is that it is a teams are encouraged and die-hards relaxed, all-American holiday. And what is more are invited to try for the individual 50K option. 6-9 CALENDAR OF EVENTS WAmerican than our plucky, ungainly turkey? Granted, Proceeds benefit the Regional Food Bank of Northeastern New although Ben Franklin lost his bid to elevate our native species to November to January York, enabling them to ensure a bountiful Thanksgiving for every- national symbol status, the turkey gets the last cackle. For when one. (fleetfeetalbany.com) Things to Do was the last time you celebrated eagle day? On Thanksgiving Day, Thursday, November 22, get ready for 11 Hiking, Snowshoeing In a wishbone world, Thanksgiving gives the least offense. the most popular running day of the whole year. Sample one of Sure, it is a worry for turkeys but a trade-off if you consider all the these six races in our area. & Camping free publicity. While slightly distasteful for vegetarians, there are While most trots cater to the 5K crowd, perfect for strollers, West Stony Creek: Well-Suited all those yummy sides and desserts to consider. Best of all is the aspiring turklings and elders, the premiere 71st annual Troy emphasis on family members, from toms to hens to the littlest Turkey Trot is the only area race where it is still possible to double for Late Fall/Early Winter turklings (think ducklings).
    [Show full text]
  • In the United States Bankruptcy Court for the District of Delaware
    Case 21-10527-JTD Doc 285 Filed 04/14/21 Page 1 of 68 IN THE UNITED STATES BANKRUPTCY COURT FOR THE DISTRICT OF DELAWARE ) In re: ) Chapter 11 ) CARBONLITE HOLDINGS LLC, et al.,1 ) Case No. 21-10527 (JTD) ) Debtors. ) (Jointly Administered) ) AFFIDAVIT OF SERVICE I, Victoria X. Tran, depose and say that I am employed by Stretto, the claims and noticing agent for the Debtors in the above-captioned case. On April 10, 2021, at my direction and under my supervision, employees of Stretto caused the following documents to be served via first-class mail on the service list attached hereto as Exhibit A, and via electronic mail on the service list attached hereto as Exhibit B: Notice of Proposed Sale or Sales of Substantially All of the Debtors’ Assets, Free and Clear of All Encumbrances, Other Than Assumed Liabilities, and Scheduling Final Sale Hearing Related Thereto (Docket No. 268) Notice of Proposed Assumption and Assignment of Designated Executory Contracts and Unexpired Leases (Docket No. 269) Furthermore, on April 10, 2021, at my direction and under my supervision, employees of Stretto caused the following documents to be served via first-class mail on the service list attached hereto as Exhibit C, and via electronic mail on the service list attached hereto as Exhibit D: Notice of Proposed Sale or Sales of Substantially All of the Debtors’ Assets, Free and Clear of All Encumbrances, Other Than Assumed Liabilities, and Scheduling Final Sale Hearing Related Thereto (Docket No. 268, Pages 1-4) Notice of Proposed Assumption and Assignment of Designated Executory Contracts and Unexpired Leases (Docket No.
    [Show full text]
  • Harris Sierra II, Programmable Cryptographic
    TYPE 1 PROGRAMMABLE ENCRYPTION Harris Sierra™ II Programmable Cryptographic ASIC KEY BENEFITS When embedded in radios and other voice and data communications equipment, > Legacy algorithm support the Harris Sierra II Programmable Cryptographic ASIC encrypts classified > Low power consumption information prior to transmission and storage. NSA-certified, it is the foundation > JTRS compliant for the Harris Sierra II family of products—which includes two package options for the ASIC and supporting software. > Compliant with NSA’s Crypto Modernization Program The Sierra II ASIC offers a broad range of functionality, with data rates greater than 300 Mbps, > Compact form factor legacy algorithm support, advanced programmability and low power consumption. Its software programmability provides a low-cost migration path for future upgrades to embedded communications equipment—without the logistics and cost burden normally associated with upgrading hardware. Plus, it’s totally compliant with all Joint Tactical Radio System (JTRS) and Crypto Modernization Program requirements. The Sierra II ASIC’s small size, low power requirements, and high data rates make it an ideal choice for battery-powered applications, including military radios, wireless LANs, remote sensors, guided munitions, UAVs and any other devices that require a low-power, programmable solution for encryption. Specifications for: Harris SIERRA II™ Programmable Cryptographic ASIC GENERAL BATON/MEDLEY SAVILLE/PADSTONE KEESEE/CRAYON/WALBURN Type 1 – Cryptographic GOODSPEED Algorithms* ACCORDION FIREFLY/Enhanced FIREFLY JOSEKI Decrypt High Assurance AES DES, Triple DES Type 3 – Cryptographic AES Algorithms* Digital Signature Standard (DSS) Secure Hash Algorithm (SHA) Type 4 – Cryptographic CITADEL® Algorithms* SARK/PARK (KY-57, KYV-5 and KG-84A/C OTAR) DS-101 and DS-102 Key Fill Key Management SINCGARS Mode 2/3 Fill Benign Key/Benign Fill *Other algorithms can be added later.
    [Show full text]
  • The Moral Character of Cryptographic Work⋆
    The Moral Character of Cryptographic Work? Phillip Rogaway Department of Computer Science University of California, Davis, USA [email protected] December 2015 (minor revisions March 2016) Abstract. Cryptography rearranges power: it configures who can do what, from what. This makes cryptography an inherently political tool, and it confers on the field an intrinsically moral dimension. The Snowden revelations motivate a reassessment of the political and moral positioning of cryptography. They lead one to ask if our inability to effectively address mass surveillance constitutes a failure of our field. I believe that it does. I call for a community-wide effort to develop more effective means to resist mass surveillance. I plead for a reinvention of our disciplinary culture to attend not only to puzzles and math, but, also, to the societal implications of our work. Keywords: cryptography · ethics · mass surveillance · privacy · Snowden · social responsibility Preamble. Most academic cryptographers seem to think that our field is a fun, deep, and politically neutral game|a set of puzzles involving communicating parties and notional adversaries. This vision of who we are animates a field whose work is intellectually impressive and rapidly produced, but also quite inbred and divorced from real-world concerns. Is this what cryptography should be like? Is it how we should expend the bulk of our intellectual capital? For me, these questions came to a head with the Snowden disclosures of 2013. If cryptography's most basic aim is to enable secure communications, how could it not be a colossal failure of our field when ordinary people lack even a modicum of communication privacy when interacting electronically? Yet I soon realized that most cryptographers didn't see it this way.
    [Show full text]
  • Cryptography
    Cryptography From Wikipedia, the free encyclopedia Jump to: navigation, search "Secret code" redirects here. For the Aya Kamiki album, see Secret Code. German Lorenz cipher machine, used in World War II to encrypt very-high-level general staff messages Cryptography (or cryptology; from Greek κρυπτός, kryptos, "hidden, secret"; and γράφ, gráph, "writing", or -λογία, -logia, respectively)[1] is the practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce. Cryptology prior to the modern age was almost synonymous with encryption, the conversion of information from a readable state to nonsense. The sender retained the ability to decrypt the information and therefore avoid unwanted persons being able to read it. Since WWI and the advent of the computer, the methods used to carry out cryptology have become increasingly complex and its application more widespread. Alongside the advancement in cryptology-related technology, the practice has raised a number of legal issues, some of which remain unresolved. Contents [hide] • 1 Terminology • 2 History of cryptography and cryptanalysis o 2.1 Classic cryptography o 2.2 The computer era • 3 Modern cryptography o 3.1 Symmetric-key cryptography o 3.2 Public-key cryptography o 3.3 Cryptanalysis o 3.4 Cryptographic primitives o 3.5 Cryptosystems • 4 Legal issues o 4.1 Prohibitions o 4.2 Export controls o 4.3 NSA involvement o 4.4 Digital rights management • 5 See also • 6 References • 7 Further reading • 8 External links [edit] Terminology Until modern times cryptography referred almost exclusively to encryption, which is the process of converting ordinary information (plaintext) into unintelligible gibberish (i.e., ciphertext).[2] Decryption is the reverse, in other words, moving from the unintelligible ciphertext back to plaintext.
    [Show full text]
  • Taschenchiffriergerat CD-57 Seite 1
    s Taschenchiffriergerat CD-57 Seite 1 Ubung zu Angewandter Systemtheorie Kryptog raph ie SS 1997 - Ubungsleiter^ Dr. Josef Scharinger Taschenchiffriergerat CD-57 Michael Topf, Matr.Nr. 9155665, Kennz. 880 <?- Cm Johannes Kepler Universitat Linz Institut fur Systemwissenschaften Abteilung fur Systemtheorie und Informationstechnik Michael Topf Ubung zu Angewandter Systemtheorie: Kryptographic Seite 2 Taschenchiffriergerat CD-57 I n ha I ts verzei c h n i s I n h a l t s v e r z e i c h n i s 2 Einleitung 3 B o r i s H a g e l i n 3 Die Hagelin M-209 Rotormaschine 3 Das Taschenchiffriergerat CD-57 4 Die Crypto AG 5 Funktionsweise 6 Kryptographisches Prinzip 6 Mechanische Realisierung 7 Black-Box-Betrachtung 7 S c h i e b e r e g i s t e r 8 Ausgangsgewichtung und Summierung. 8 Daten 9 Anfangszustand der Schieberegister (Stiftposition) 9 Gewichtung der Schieberegister-Ausgange (Position der Anschlage) 9 Softwaremodell \\ Quelltext «CD-57.C » \\ Beispiel 12 Schliisseleinstellungen « Schluessel.txt » 12 Primartext « Klartext.txt » 13 Programmaufruf 13 Sekundartext « Geheimtext.txt » 13 Abbildungsverzeichnis 14 Tabellenverzeichnis 14 Quellenverzeichnis , 14 Ubung zu Angewandter Systemtheorie: Kryptographie Michael Topf Taschenchiffriergerat CD-57 Seite 3 Ei nleitu ng Der geistige Vater des betrachtelen Chiffriergerats sowie einer Reihe verwandter Gerate ist der Schwede Boris Hagelin. Daher sollen einleitend er, die Familie der Rotor-Kryptographierer sowie die von ihm gegriindete Schweizer Firma Crypto AG, vorgestellt werden. B o r i s H a g e l i n Boris Hagelin war ein Visionar, der bereits zu seiner Zeit die Probleme der Informationstechnologie erkannte.
    [Show full text]