Timeline 1600 - 1900 AD 17th century Cardinal Richelieu invents an encryption-tool called grille, a card with holes for writing messages on paper into the holes of those cards. Afterwards he removes the cards and fills in the blanks, so the message looks like an ordinary letter. The recipient needs to own the same card - Bishop John Wilkins invents a cryptologic system looking like music notes. In a book he describes several forms of steganographic systems like secrets inks, but also the string cipher. He mentions the so-called Pig Latin, a spoken way of encryption that was already used by the ancient Indians - the English scientist, magician and astrologer 1605/1623 Sir Francis Bacon (= Francis Tudor = William Shakespeare?) writes several works containing ideas about cryptography. One of his most important advises is to use ciphers in such a way that no-one gets suspicious that the text could be enciphered. For this the steganogram was the best method, very often used in poems. The attempt to decipher Shakespeare's sonnets (in the 20th century) lead to the idea that his works had been written by Francis Bacon originally. 1671 Leibniz invents a calculating machine that uses the binary scale which we still use today, more advanced of course, called the ASCII code 18th century this is the time of the Black Chambers of espionage in Europe, Vienna having one of the most effective ones, called the "Geheime Kabinettskanzlei", headed by Baron Ignaz von Koch. Its task is to read through international diplomatic mail, copy letters and return them to the post-office the same morning. Supposedly about 100 letters are dealt with each day. 1790's Thomas Jefferson and Robert Patterson invent a wheel cipher 1799 the Rosetta Stone is found and makes it possible to decipher the Egyptian Hieroglyphs 1832 or 1838 Sam Morse develops the Morse Code, which actually is no code but an enciphered alphabet of short and long sounds. The first Morse code-message is sent by telegraph in 1844. 1834 the 1844 the invention of the telegraph changes cryptography very much, as codes are absolutely necessary by then 1854 the Playfair cipher is invented by Sir Charles Wheatstone 1859 for the first time a tomographic cipher gets described 1861 Friedrich W. Kasiski does a cryptoanalysis of the Vigenère ciphers, which had been supposed to be uncrackable for ages 1891 Major Etienne Bazeries creates a new version of the wheel cipher, which is rejected by the French Army 1895 the invention of the radio changes cryptography-tasks again and makes them even more important |
|
Timeline 1900-1970 AD 1913 the wheel cipher gets re-invented as a strip 1917 - an AT&T-employee, Gilbert S. Vernam, invents a polyalphabetic cipher machine that works with random-keys 1918 the Germans start using the ADFGVX-system, that later gets later by the French Georges Painvin - Arthur Scherbius patents a ciphering machine and tries to sell it to the German Military, but is rejected 1919 Hugo Alexander Koch invents a rotor cipher machine 1921 the Hebern Electric Code, a company producing electro-mechanical cipher machines, is founded 1923 Arthur Scherbius founds an enterprise to construct and finally sell his late 1920's/30's more and more it is criminals who use cryptology for their purposes (e.g. for smuggling). Elizabeth Smith Friedman deciphers the codes of rum-smugglers during prohibition regularly 1929 Lester S. Hill publishes his book Cryptography in an Algebraic Alphabet, which contains enciphered parts 1933-1945 the Germans make the Enigma machine its cryptographic main-tool, which is broken by the Poles Marian Rejewski, Gordon Welchman and Alan Turing's team at Bletchley Park in England in 1939 1937 the Japanese invent their so called Purple machine with the help of Herbert O. Yardley. The machine works with telephone stepping relays. It is broken by a team of 1930's the Sigaba machine is invented in the USA, either by W.F. Friedman or his colleague Frank Rowlett - at the same time the British develop the Typex machine, similar to the German Enigma machine 1943 Colossus, a code breaking computer is put into action at Bletchley Park 1943-1980 the cryptographic Venona Project, done by the NSA, is taking place for a longer period than any other program of that type 1948 Shannon, one of the first modern cryptographers bringing mathematics into cryptography, publishes his book A Communications Theory of Secrecy Systems 1960's the Communications-Electronics Security Group (= CESG) is founded as a section of Government Communications Headquarters (= GCHQ) late 1960's the IBM Watson Research Lab develops the Lucifer cipher 1969 James Ellis develops a system of separate public-keys and private-keys |
|
Legal Protection: National Legislation |
|
Cryptography's Terms and background "All nature is merely a cipher and a secret writing." Blaise de Vigenère In the (dis-)information age getting information but at the same time excluding others from it is part of a power-game (keeping the other uneducated). The reason for it eventually has found an argument called security. Compared to the frequency of its presence in articles, the news and political speeches security seems to be one of the most popular words of the 90's. It must be a long time ago when that word was only used for and by the military and the police. Today one can find it as part of every political issue. Even development assistance and nutrition programs consider it part of its work. The so-called but also real need for information security is widespread and concerning everybody, whether someone uses information technology or not. In any case information about individuals is moving globally; mostly sensitive information like about bank records, insurance and medical data, credit card transactions, and much much more. Any kind of personal or business communication, including telephone conversations, fax messages, and of course e-mail is concerned. Not to forget further financial transactions and business information. Almost every aspect of modern life is affected. We want to communicate with everybody - but do not want anybody to know. Whereas the market already depends on the electronic flow of information and the digital tools get faster and more sophisticated all the time, the rise of privacy and security concerns have to be stated as well. With the increase of digital communication its vulnerability is increasing just as fast. And there exist two (or three) elements competing and giving the term digital security a rather drastic bitter taste: this is on the one hand the growing possibility for criminals to use modern technology not only to hide their source and work secretly but also to manipulate financial and other transfers. On the other hand there are the governments of many states telling the population that they need access to any kind of data to keep control against those criminals. And finally there are those people, living between enlightening security gaps and at the same time harming other private people's actions with their work: computer hackers. While the potential of global information is regarded as endless, it is those elements that reduce it. There is no definite solution, but at least some tools have been developed to improve the situation: cryptography, the freedom to encode those data that one does not want to be known by everybody, and give a possibility to decode them to those who shall know the data. During the last 80 years cryptography has changed from a mere political into a private, economic but still political tool: at the same time it was necessary to improve the tools, eventually based on mathematics. Hence generally cryptography is regarded as something very complicated. And in many ways this is true as the modern ways of enciphering are all about mathematics. "Crypto is not mathematics, but crypto can be highly mathematical, crypto can use mathematics, but good crypto can be done without a great reliance on complex mathematics." (W.T. Shaw) For an introduction into cryptography and the mathematical tasks see: |
|
AOL Time Warner The largest media conglomerate in the world, Time Warner resulted from the merger of the publisher Time Inc. and the media company Turner Broadcasting Systems, Inc. in 1996. Time Inc. founded in 1922 primarily concentrated on magazines and books and in the 1950s moved into the broadcasting and entertainment industry, but in the 1970s announced that it was selling its broadcasting holdings and concentrating on cable television. In 1989 Time Inc. merged with Warner Communications Inc., which besides being a major motion-picture and television studio, was also one of the biggest U.S. music recordings producers and cable-television operators. In January 2000 Time Warner merged with AOL (America Online) in a US$ 243.3 billion deal. Although AOL so far generated far less profit and turnover than Time Warner its quotation on the stock exchange was clearly higher, making Time Warner the junior partner (45 percent) in the new company. Through its merger with AOL, which is a major player in the online-business and owns several Internet-services like Compuserve, Netscape and Netcenter, the new media conglomerate could significantly enlarge its online presence and also complement its traditional media activities. |
|
Extract of AOL Time Warner’s Content Production and Distribution Holdings The following selection does not claim to present an exhaustive listing, but rather picks some of the company's most important assets. Due to the rapid developments in the world of media giants the list is also subject to changes. Cable TV Systems and Channels/Networks Cable TV channels/networks (some part-owned): HBO, HBO Plus, HBO Signature, HBO Family, HBO Comedy, HBO Zone, Cinemax, MoreMAX, ActionMAX, ThrillerMAX, HBO en Espa-ol, Comedy Central, Court TV, HBO Ole, HBO Asia, HBO Central Europe, Movies, TV, Video Production, and Movie Theaters Warner Bros. film studio Warner Bros. Television production studios Warner Bros. Home Video Turner worldwide Home Video Turner Pictures Castle Rock Entertainment movie production company New Line Cinema movie production company Warner Bros. film library Turner Film Library Hanna Barbera Cartoons Owns many movie houses, with over 1,000 screens, around the world Book Publishing Time Life Inc. Book-of-the-Month Club Warner Books Little, Brown and Company Oxmoor House Leisure Arts Sunset Books Magazines Time, People, Sports Illustrated, Fortune, Life, Money, Parenting, In Style, Entertainment Weekly, Cooking Light, Baby Talk, First Moments, Coastal Living, Health, Progressive Farmer, Southern Accents, Southern Living, Sports Illustrated, For Kids, Sunset, Teen People, Time for Kids, Weight Watchers, Mutual Funds, Your Company, Asiaweek, President, Wallpaper. Hippocrates Recorded Music Warner Music Group The Atlantic Group Elektra Entertainment Group Rhino Entertainment Sire Records Group Warner Bros. Records Warner Music International WEA Inc. WEA Corp. WEA Manufacturing Ivy Hill Corp. Warner Special Products Alternative Distribution Alliance Giant Merchandising Deals with record labels include: Maverick records Tommy Boy Sub Pop Qwest 143 Records Internet and New Media About 130 Websites including: CNN.com, AllPolitics.com, CNNSI.com, Time Digital, People, Southern Living, Sports Illustrated Turner New Media Online Services including: Compuserve, Netscape, Netcenter Pro Sports Teams and Promotions Atlanta Braves major league baseball team Atlanta Hawks NBA basketball team World Championship Wrestling Goodwill Games Other Six Flags entertainment/excursion parks Warner Bros. Movie World theme park Over 150 Warner Bros. stores, plus Turner Retail Group 25 % stake in Atari 14 % stake in Hasbro Business Connections with Other Media Companies Joint ventures, equity interests or major arrangements with |
|
RTMark and Adbusters at the WTO Conference in Seattle The 1999 Adbusters, well known as fighters against corporate disinformation, injustices in the global economy and "physical and mental pollution", timely for the WTO Conference purchased three billboards in downtown Seattle. Featuring an image with the text "System Error - Type 2000 (progress)", the billboards were meant to challenge "... the WTO's agenda of global corporate growth and expose what isn't reflected in the United State's GNP - human and environmental capital." At the same time RTMark went on-line with its spoof WTO website http://gatt.org. Shortly after its release WTO Director-General Mike Moore accused RTMark of attempting to "undermine WTO transparency" by copying the WTO website's design and using "domain names such as `www.gatt.org` and page titles such as 'World Trade Organization / GATT Home Page' which make it difficult for visitors to realize that these are fake pages." http://gatt.org is not the first time that RTMark has used website imitation aiming at rendering an entity more transparent. RTMark has performed the same "service" for |
|
Roman smoke telegraph network, 150 A.D. The Roman smoke signals network consisted of towers within visible range of each other and had a total length of about 4500 kilometers. It was used for military signaling. For a similar telegraph network in ancient Greece see |
|
Moral rights Authors of copyrighted works (besides |
|
Kessler Marketing Intelligence (KMI) KMI is the leading source for information on fiber-optics markets. It offers market research, strategic analysis and product planning services to the opto-electronics and communications industries. KMI tracks the worldwide fiber-optic cable system and sells the findings to the industry. KMI says that every fiber-optics corporation with a need for strategic market planning is a subscriber to their services. |
|
T. Matthew Ciolek, Global Networking: A Timeline This document, intended as a reliable electronic reference tool, provides a timeline for three types of developments and milestones: (1) advances in long distance person-to-person communication; (2) advances in storage, replication, cataloguing, finding, and retrieval of data; and (3) standardization of concepts and tools for long distance interaction. The advancements may have a technical (hardware), conceptual (software), or an organizational aspect, or represent an important milestone in the history of a given invention, and are annotated as such in the timeline. The period covered ranges from 30000 BC up to now. http://www.ciolek.com/PAPERS/milestones.html |
|
Internet Software Consortium The Internet Software Consortium (ISC) is a nonprofit corporation dedicated to the production of high-quality reference implementations of Internet standards that meet production standards. Its goal is to ensure that those reference implementations are properly supported and made freely available to the Internet community. http://www.isc.org |
|
Gutenberg's printing press, 1455 Gutenberg's printing press, an innovative aggregation of inventions known for centuries before Gutenberg: the olive oil press, oil-based ink, block-print technology, and movable types, allowed the mass production of the movable type used to reproduce a page of text and increased the production rate enormously. During the Middle Ages monks took at least a year over making a handwriting copy of a book. Gutenberg printed about 300 sheets per day. Because parchment was too costly for mass production - often for the production of one copy of a medieval book a whole flock of sheep was used - it was substituted by cheap paper made from recycled clothing left over from the massive number of dead caused by the Great Plague. Within forty-five years, in 1500, already ten million copies were available for a few hundred thousand literate. Because individuals could examine a range of opinions now, the printed Bible, especially after having been translated into German by Martin Luther, and increasing literacy added to the subversion of clerical authorities. The interest in books increased with the rise of vernacular, non-Latin literary texts, beginning with Dante's Divine Comedy, the first literary text written in Italian. Among others, the improvement of the distribution and the production of books and increased literacy made the development of print mass media possible. Michael Giesecke (Sinnenwandel Sprachwandel Kulturwandel. Studien zur Vorgeschichte der Informationsgesellschaft, Frankfurt am Main: Suhrkamp, 1992) has shown that due to a division of labor among authors, printers and typesetters Gutenberg's invention increasingly led to a standardization of - written and unwritten - language in form of orthography, grammar and signs. To communicate one's ideas became linked to the use of a kind of code, and reading became a kind of rite of passage, in every human's life an important step towards independency. With the increasing linkage of knowledge to wide reading and learnedness, the history of knowledge becomes the history of readings, of readings dependent on chance and on circumstance. For further details see: Martin Warnke, Text und Technik, Bruce Jones, Manuscripts, Books, and Maps: The Printing Press and a Changing World, |
|
IIPA The International |
|
Medieval universities and copying of books The first of the great medieval universities was established at Bologna. At the beginning, universities predominantly offered a kind of do-it-yourself publishing service. Books still had to be copied by hand and were so rare that a copy of a widely desired book qualified for being invited to a university. Holding a lecture equaled to reading a book aloud, like a priest read from the Bible during services. Attending a lecture equaled to copy a lecture word by word, so you had your own copy of a book, thus enabling you to hold a lecture, too. For further details see History of the Idea of a University, |
|
Digital Subscriber Line (DSL) DSL connections are high-speed data connections over copper wire telephone lines. As with cable connections, with DSL you can look up information on the Internet and make a phone call at the same time but you do not need to have a new or additional cable or line installed. One of the most prominent DSL services is ISDN (integrated services digital network, for more information click here ( |
|