Cryptography's Terms and background

"All nature is merely a cipher and a secret writing."
Blaise de Vigenère

In the (dis-)information age getting information but at the same time excluding others from it is part of a power-game (keeping the other uneducated). The reason for it eventually has found an argument called security.
Compared to the frequency of its presence in articles, the news and political speeches security seems to be one of the most popular words of the 90's. It must be a long time ago when that word was only used for and by the military and the police. Today one can find it as part of every political issue. Even development assistance and nutrition programs consider it part of its work.
The so-called but also real need for information security is widespread and concerning everybody, whether someone uses information technology or not. In any case information about individuals is moving globally; mostly sensitive information like about bank records, insurance and medical data, credit card transactions, and much much more. Any kind of personal or business communication, including telephone conversations, fax messages, and of course e-mail is concerned. Not to forget further financial transactions and business information. Almost every aspect of modern life is affected.
We want to communicate with everybody - but do not want anybody to know.

Whereas the market already depends on the electronic flow of information and the digital tools get faster and more sophisticated all the time, the rise of privacy and security concerns have to be stated as well.
With the increase of digital communication its vulnerability is increasing just as fast. And there exist two (or three) elements competing and giving the term digital security a rather drastic bitter taste: this is on the one hand the growing possibility for criminals to use modern technology not only to hide their source and work secretly but also to manipulate financial and other transfers. On the other hand there are the governments of many states telling the population that they need access to any kind of data to keep control against those criminals. And finally there are those people, living between enlightening security gaps and at the same time harming other private people's actions with their work: computer hackers.
While the potential of global information is regarded as endless, it is those elements that reduce it.

There is no definite solution, but at least some tools have been developed to improve the situation: cryptography, the freedom to encode those data that one does not want to be known by everybody, and give a possibility to decode them to those who shall know the data.

During the last 80 years cryptography has changed from a mere political into a private, economic but still political tool: at the same time it was necessary to improve the tools, eventually based on mathematics. Hence generally cryptography is regarded as something very complicated. And in many ways this is true as the modern ways of enciphering are all about mathematics.

"Crypto is not mathematics, but crypto can be highly mathematical, crypto can use mathematics, but good crypto can be done without a great reliance on complex mathematics." (W.T. Shaw)

For an introduction into cryptography and the mathematical tasks see:
http://www.sbox.tu-graz.ac.at/home/j/jonny/projects/crypto/index.htm
http://www.ccc.de/CCC-CA/policy.html

TEXTBLOCK 1/6 // URL: http://world-information.org/wio/infostructure/100437611776/100438658895
 
Epilogue

As scientists are working hard on a quantum computer and also on quantum cryptography one can imagine that another revolution in the study of encryption has to be expected within the next years. By then today's hardware and software tools will look extraordinary dull. At the moment it is impossible to foresee the effects on cryptography and democratic developments by those means; the best and the worst can be expected at the same time. A certain ration of pessimism and prosecution mania are probably the right mixture of emotions about those tendencies, as the idea of big brother has come into existence long ago.

At the same time it will - in part - be a decision of the people to let science work against them or not. Acceleration of data-transmission calls for an acceleration of encryption-methods. And this again falls back on us, on an acceleration of daily life, blurring the private and the public for another time.
We live in an intersection, job and private life growing together. Cryptography cannot help us in that case. The privacy in our mind, the virtuality of all private and public lies in the field of democracy, or at least what is - by connection to the Human Rights - regarded as democracy.

TEXTBLOCK 2/6 // URL: http://world-information.org/wio/infostructure/100437611776/100438658875
 
The Concept of the Public Sphere

According to social critic and philosopher Jürgen Habermas "public sphere" first of all means "... a domain of our social life in which such a thing as public opinion can be formed. Access to the public sphere is open in principle to all citizens. A portion of the public sphere is constituted in every conversation in which private persons come together to form a public. They are then acting neither as business or professional people conducting their private affairs, nor as legal consociates subject to the legal regulations of a state bureaucracy and obligated to obedience. Citizens act as a public when they deal with matters of general interest without being subject to coercion; thus with the guarantee that they may assemble and unite freely, and express and publicize their opinions freely."

The system of the public sphere is extremely complex, consisting of spatial and communicational publics of different sizes, which can overlap, exclude and cover, but also mutually influence each other. Public sphere is not something that just happens, but also produced through social norms and rules, and channeled via the construction of spaces and the media. In the ideal situation the public sphere is transparent and accessible for all citizens, issues and opinions. For democratic societies the public sphere constitutes an extremely important element within the process of public opinion formation.

TEXTBLOCK 3/6 // URL: http://world-information.org/wio/infostructure/100437611734/100438658403
 
The Cassini Case

In 1997 NASA's Cassini mission to Saturn and its moons led to heated controversies, because it was fueled by plutonium, a substance that could cause serious environmental and health problems if it were released into the atmosphere.

Still no major U.S. news outlet in broadcasting or print reported in depth on the risks of the Cassini mission. Westinghouse-owned media like CBS and NBC (also partly owned by General Electric) for example had only reported that children were invited to sign a plaque inside Cassini. Not surprisingly Westinghouse and General Electric are two of the largest corporations with defense contracts and nuclear interests.

TEXTBLOCK 4/6 // URL: http://world-information.org/wio/infostructure/100437611734/100438658562
 
Product Placement

With television still being very popular, commercial entertainment has transferred the concept of soap operas onto the Web. The first of this new species of "Cybersoaps" was "The Spot", a story about the ups and downs of an American commune. The Spot not only within short time attracted a large audience, but also pioneered in the field of online product placement. Besides Sony banners, the companies logo is also placed on nearly every electronic product appearing in the story. Appearing as a site for light entertainment, The Spots main goal is to make the name Sony and its product range well known within the target audience.

TEXTBLOCK 5/6 // URL: http://world-information.org/wio/infostructure/100437611652/100438658026
 
Economic structure; introduction



"Globalization is to no small extent based upon the rise of rapid global communication networks. Some even go so far as to argue that "information has replaced manufacturing as the foundation of the economy". Indeed, global media and communication are in some respects the advancing armies of global capitalism."

(Robert McChesney, author of "Rich Media, Poor Democracy")

"Information flow is your lifeblood."

(Bill Gates, founder of Microsoft)

The usefulness of information and communication technologies increases with the number of people who use them. The more people form part of communication networks, the greater the amount of information that is produced. Microsoft founder Bill Gates dreams of "friction free capitalism", a new stage of capitalism in which perfect information becomes the basis for the perfection of the markets.

But exploitative practices have not disappeared. Instead, they have colonised the digital arena where effective protective regulation is still largely absent.

Following the dynamics of informatised economies, the consumption habits and lifestyles if customers are of great interest. New technologies make it possible to store and combine collected data of an enormous amount of people.

User profiling helps companies understand what potential customers might want. Often enough, such data collecting takes place without the customer's knowledge and amounts to spying.

"Much of the information collection that occurs on the Internet is invisible to the consumer, which raises serious questions of fairness and informed consent."

(David Sobel, Electronic Privacy Information Center)

TEXTBLOCK 6/6 // URL: http://world-information.org/wio/infostructure/100437611726/100438658916
 
Cisco, Inc.

Being the worldwide leader in networking for the Internet, Cisco Systems is one of the most prominent companies of the Internet industry.

http://www.cisco.com

INDEXCARD, 1/5
 
Cyborg manifesto

The full title of Dona Haraway's Cyborg Manifesto is "A Cyborg Manifesto: Science, Technology, and Socialist-Feminism in the Late Twentieth Century", published by Routledge, New York, in 1991. Online e excerpts of this classic are located at

http://www.stanford.edu/dept/HPS/Haraway/CyborgManifesto.html

http://www.stanford.edu/dept/HPS/Haraway/Cybo...
INDEXCARD, 2/5
 
Mass production

The term mass production refers to the application of the principles of specialization, division of labor, and standardization of parts to the manufacture of goods. The use of modern methods of mass production has brought such improvements in the cost, quality, quantity, and variety of goods available that the largest global population in history is now sustained at the highest general standard of living. A moving conveyor belt installed in a Dearborn, Michigan, automobile plant in 1913 cut the time required to produce flywheel magnetos from 18 minutes to 5 and was the first instance of the use of modern integrated mass production techniques.

INDEXCARD, 3/5
 
Defense Advanced Research Project Agency (DARPA)

DARPA (Defense Advanced Research Projects Agency) is the independent research branch of the U.S. Department of Defense that, among its other accomplishments, funded a project that in time was to lead to the creation of the Internet. Originally called ARPA (the "D" was added to its name later), DARPA came into being in 1958 as a reaction to the success of Sputnik, Russia's first manned satellite. DARPA's explicit mission was (and still is) to think independently of the rest of the military and to respond quickly and innovatively to national defense challenges.

In the late 1960s, DARPA provided funds and oversight for a project aimed at interconnecting computers at four university research sites. By 1972, this initial network, now called the ARPAnet, had grown to 37 computers. ARPANet and the technologies that went into it, including the evolving Internet Protocol (IP) and the Transmission Control Protocol (TCP), led to the Internet that we know today.

http://www.darpa.mil

INDEXCARD, 4/5
 
Enigma

Device used by the German military command to encode strategic messages before and during World War II. The Enigma code was broken by a British intelligence system known as Ultra.

INDEXCARD, 5/5