Cryptography's Terms and background

"All nature is merely a cipher and a secret writing."
Blaise de Vigenère

In the (dis-)information age getting information but at the same time excluding others from it is part of a power-game (keeping the other uneducated). The reason for it eventually has found an argument called security.
Compared to the frequency of its presence in articles, the news and political speeches security seems to be one of the most popular words of the 90's. It must be a long time ago when that word was only used for and by the military and the police. Today one can find it as part of every political issue. Even development assistance and nutrition programs consider it part of its work.
The so-called but also real need for information security is widespread and concerning everybody, whether someone uses information technology or not. In any case information about individuals is moving globally; mostly sensitive information like about bank records, insurance and medical data, credit card transactions, and much much more. Any kind of personal or business communication, including telephone conversations, fax messages, and of course e-mail is concerned. Not to forget further financial transactions and business information. Almost every aspect of modern life is affected.
We want to communicate with everybody - but do not want anybody to know.

Whereas the market already depends on the electronic flow of information and the digital tools get faster and more sophisticated all the time, the rise of privacy and security concerns have to be stated as well.
With the increase of digital communication its vulnerability is increasing just as fast. And there exist two (or three) elements competing and giving the term digital security a rather drastic bitter taste: this is on the one hand the growing possibility for criminals to use modern technology not only to hide their source and work secretly but also to manipulate financial and other transfers. On the other hand there are the governments of many states telling the population that they need access to any kind of data to keep control against those criminals. And finally there are those people, living between enlightening security gaps and at the same time harming other private people's actions with their work: computer hackers.
While the potential of global information is regarded as endless, it is those elements that reduce it.

There is no definite solution, but at least some tools have been developed to improve the situation: cryptography, the freedom to encode those data that one does not want to be known by everybody, and give a possibility to decode them to those who shall know the data.

During the last 80 years cryptography has changed from a mere political into a private, economic but still political tool: at the same time it was necessary to improve the tools, eventually based on mathematics. Hence generally cryptography is regarded as something very complicated. And in many ways this is true as the modern ways of enciphering are all about mathematics.

"Crypto is not mathematics, but crypto can be highly mathematical, crypto can use mathematics, but good crypto can be done without a great reliance on complex mathematics." (W.T. Shaw)

For an introduction into cryptography and the mathematical tasks see:
http://www.sbox.tu-graz.ac.at/home/j/jonny/projects/crypto/index.htm
http://www.ccc.de/CCC-CA/policy.html

TEXTBLOCK 1/3 // URL: http://world-information.org/wio/infostructure/100437611776/100438658895
 
History: European Tradition

Only in Roman times the first rights referring to artistic works appeared. Regulations resembling a lasting exclusive right to copy did not occur until the 17th century. Before copyright was a private arrangement between guilds able to reproduce copies in commercial quantities.

In France and Western European countries "droits d'auteur" or author's rights is the core of what in the Anglo-American tradition is called copyright. Such rights are rooted in the republican revolution of the late 18th century, and the Rights of Man movement. Today in the European system the creator is front and center; later exploiters are only secondary players.

France

During the 18th century France gradually lost the ability to restrict intellectual property. Before the Revolution, all books, printers and booksellers had to have a royal stamp of approval, called a "privilege". In return for their lucrative monopoly, the French guild of printers and booksellers helped the police to suppress anything that upset royal sensibilities or ran contrary to their interests. Still there were also a whole lot of underground printers who flooded the country with pirated, pornographic and seditious literature. And thousands of writers, most at the edge of starvation.

In 1777 the King threatened the monopoly by reducing the duration of publisher's privileges to the lifetime of the authors. Accordingly a writer's work would go into the public domain after his death and could be printed by anyone. The booksellers fought back by argumenting that, no authority could take their property from them and give it to someone else. Seven months later, in August 1789, the revolutionary government ended the privilege system and from that time on anyone could print anything. Early in 1790 Marie-Jean-Antoine-Nicolas de Caritat, Marquis de Condorcet proposed giving authors power over their own work lasting until ten years after their deaths. The proposal - the basis for France's first modern copyright law - passed in 1793.

TEXTBLOCK 2/3 // URL: http://world-information.org/wio/infostructure/100437611725/100438659414
 
Like that car? The tricks of the data body industry

2. Like that car? The tricks of the data body industry

In the New Economy, data have become a primary resource. Businesses unable to respond to the pressure of informatisation are quickly left behind. "Information is everything" has become the war-cry of the New Economy. More than ever, business companies now collect data related to their customers, their competitors, economic indicators, etc., and compile them in data warehouses. Large amounts of data acquired can be turned into a systematic collection called a data warehouse through data mining techniques. These data can be used for marketing, stock exchange transactions, risk assessment, and many other purposes.

However, there are also many companies that specialise in data body economics as the main line of business. They collect huge amount of data process and enhance them (thereby increasing the value of the data) and offer them on to other companies. Direct marketing companies belong to this category. Direct marketing companies carry out targeted marketing, also called strategic marketing, aimed at individual customers or groups of customers. This process is based on a consumer profile, a collection of data containing personal information such as age, sex, marital status, employment, address, and information about consumer and payment behaviour. Based upon this profile, conclusions regarding possible future consumption are drawn and offers are made.

For example, somebody who has been attracted by a car on display in an airport terminal and completes a card with name and address to participate in a draw reveals a lot of economically valuable information about him / herself. Apart from name and address, and other data that is completed on the card, this person also can be assumed to be a potential car buyer (evidently he / she wants a car) and to be relatively affluent (the poor do not normally travel by plane). The time when you complete the card also provides information: in July and August, you are more likely to be a holiday maker than in November. Possibly in small print somewhere on the ticket you complete you agree to receive more information about this and other products, and you agree also that your data are "electronically processed". The data acquired this way can normally be expected to be much more valuable than the car the is offered in the draw. Most people who completed the cards will not win in the draw, but instead end up on directs marketing data warehouses and one day receive offers of products and services which they never knew they wanted.

TEXTBLOCK 3/3 // URL: http://world-information.org/wio/infostructure/100437611761/100438659665
 
Mass production

The term mass production refers to the application of the principles of specialization, division of labor, and standardization of parts to the manufacture of goods. The use of modern methods of mass production has brought such improvements in the cost, quality, quantity, and variety of goods available that the largest global population in history is now sustained at the highest general standard of living. A moving conveyor belt installed in a Dearborn, Michigan, automobile plant in 1913 cut the time required to produce flywheel magnetos from 18 minutes to 5 and was the first instance of the use of modern integrated mass production techniques.

INDEXCARD, 1/3
 
Data mining

In data mining, data are analysed for relationships among them that have not yet been detected. This is a process used in scientific research as well as in marketing and administration. Through data mining, new surplus data can be generated out of a given quantity of data.

A good general introduction to data mining and further links can be found at the University of Anglia's Data Mining Group

http://www.sys.uea.ac.uk/Research/researchare...
INDEXCARD, 2/3
 
Data warehouse

A data warehouse is a central repository for all or significant parts of the data that an enterprise's various business systems collect. Data warehousing emphasises the capture of data from various sources, and combines them into economically valuable entities. A data warehouse is the end product of a process of data processing that may include data mining.

INDEXCARD, 3/3