|
some essential definitions some essential definitions in the field of cryptography are: - - - "Few false ideas have more firmly gripped the minds of so many intelligent men than the one that, if they just tried, they could invent a cipher that no one could break." (David Kahn) The variants of encryption systems are endless. For deciphering there exists always the same game of trial and error (first guessing the encryption method, then the code). A help to do so is pruning. Once, after a more or less long or short period a code/cipher breaks. Monoalphabetic ciphers can be broken easily and of course are no longer used today but for games. for further information on codes and ciphers etc. see: |
|
|
|
1980s: Artificial Intelligence (AI) - From Lab to Life Following the commercial success of New technologies were being invented in Japan. |
|
|
|
Radio Between the two World Wars the radio started becoming more and more important; as well in education (e.g. By hearing unconsciously, without listening, while concentrating on something else, it is easy to spread ideas and emotions. This fact was taken advantage of. The German Minister for Propaganda, Radio Moscow, which started working in 1922, tried to intervene in innerstate-affairs in Britain as well as in other countries. The radio was supposed to push ahead the idea of communism. |
|
|
|
Another voluntary Disinformation A very different form of voluntary disinformation are the calls for donations. Donations offer the possibility to do something good, to help the poor. Afterwards one does no longer have to feel guilty for being luckier than those "others". The same pictures of starving and desperate children for decades, of starving babies with big sad eyes. The pictures show a terrible life. But the idea that contributing money would change the destiny of those children and other people is a lie. States use their population for paying money to make the states' policy less unjust. In fact the money of the Western donators perpetuates the dependence and because of this prolongs the misery into a vicious circle of disinformation on both sides, but it is clever to have one's people believing that they can change the world. |
|
|
|
The Right to get Disinformed Disinformation might also be welcome: While the ones criticize disinformation and try to fight against it, others do nothing against it. And others again seem to enjoy getting disinformed. How this works? It is the result of a society that does no longer want to live under the pressure of doing and hearing everything at the same time. Acceleration of life seems too fast. The only way to get out is to refuse certain things/messages/truths. Receiving disinformation can be more comfortable than getting so-called correct information. This is especially true for the readers of the yellow press. The yellow press lives on that perspective, the commodity of getting light news, mostly wrong news and lies - but those being wrapped up in nice pictures and stories about those who seem to reign the world. The aim is the escape out of reality. A surplus of information, information terror, can produce disinformation. The profusion can get exploited for disinformation. This works in that way that in the mass of information the individual has no possibility to get an overview of the different ways of thinking and to reach a stage of objective knowledge. |
|
|
|
cryptoanalysis the study of breaking others' codes to transform a message back into a legible form without knowing the key from the beginning |
|
|
|
codes an algorithm for bringing a legible message into an illegible form. There has to exist some sort of code book to encode/decode it. |
|
|
|
Division of labor The term refers to the separation of a work process into a number of tasks, with each task performed by a separate person or group of persons. It is most often applied to |
|
|
|
Moral rights Authors of copyrighted works (besides |
|
|
|
ciphertext the enciphered/encoded and primarily illegible text |
|
|
|
NSFNet Developed under the auspices of |
|
|
|
Backbone Networks Backbone networks are central networks usually of very high bandwidth, that is, of very high transmitting capacity, connecting regional networks. The first backbone network was the |
|
|
|
cryptology also called "the study of code". It includes both, cryptography and cryptoanalysis |
|
|