1950: The Turing Test

Alan Turing, an English mathematician and logician, advocated the theory that eventually computers could be created that would be capable of human thought. To cut through the long philosophical debate about exactly how to define thinking he proposed the "imitation game" (1950), now known as Turing test. His test consisted of a person asking questions via keyboard to both a person and an intelligent machine within a fixed time frame. After a series of tests the computers success at "thinking" could be measured by its probability of being misidentified as the human subject. Still today Turing's papers on the subject are widely acknowledged as the foundation of research in artificial intelligence.

TEXTBLOCK 1/3 // URL: http://world-information.org/wio/infostructure/100437611663/100438659354
 
Introduction

"A man is crazy who writes a secrete
in any other way than one which
will conceal it from the vulgar."
Roger Bacon (~1250 AD)



The essence of human communication is not only the social behavior to give or get messages (of whatever meaning) but also how to give and get them, and to include certain people by excluding others from the process of informing.
e.g. whispering is an effective way of talking to exclude the majority.
What about ways of writing?
Already some of the first written messages in human history obviously found special forms of hiding contents from the so-called others. When the knowledge of writing meant a privilege in a stronger sense as it is true today (in China for a long period writing was forbidden to people not working for the government), the alphabet itself was a kind of cryptography (that is why Catholic churches were painted with pictures explaining the stories of the Bible).

Certainly the methods of deciphering and enciphering improved a lot during the last 4.000 years. In the meantime cryptography has become a topic without end and with less technological limits every day. On the one hand there is the field of biometrics, which is highly related to cryptography but still in its beginnings, on the other hand there emerge so-called infowars, which intend to substitute or at least accompany war and are unthinkable without cryptography.
But there is much more to detect, like the different forms of de- and encoding. And very important, too, there is the history of cryptography that tells us about the basics to make it easier to understand today's issues.

In the actual age of (dis-)information storing and transporting electronic information safely increases its importance. Governments, institutions, economy and individuals rely on the hope that no-one can read or falsify their messages/data as it is much more difficult to detect and proof abuses in electronic media than in elder forms of written communication.

TEXTBLOCK 2/3 // URL: http://world-information.org/wio/infostructure/100437611776/100438658802
 
Who are you?

Who are you?

Direct marketing companies have many othe ways of appropriating data bodies. Allowing form regional and national variations, data are obtained from registration cards, telephone directories, social insurance data bass, religious groups, educational institutions, trade unions, registry offices, banks and of course from the date trace left behind in digital environments, e.g. by clicking on an advertising banner. Direct marketing companies collect als this data systemtically and enhance them, i.e. they associate a range of different indicators with a person's name. Techniques used range from simple inferences ("if you are German and your name is Claudia, you are 80 % likely to be between 25 and 33 years old") to complicated data mining programmes such as Knowledge Seeker, Enterprise Miner, or Scenario. Indicators include

    postal address

    sex

    size of household

    age group

    purchasing power

    neighbourhood quality

    size of town

    region

    professional and academic titles

    phone and fax numbers

    e-mail address

    pronness for mail-order purchasing

    number of children

    age of children

    marital status

    purchasing patterns

    investment behaviour

    credit status

    credit history

    convictions

    nature of products and services purchased

    many other social and economic indicators



There can be a hundred or more indicators associated to an individual's name. Direct marketing companies such as Abacus direct and Schober maintain databases that include almost everybody with a social existence. In fact, dirct marketing in increasingly becoming the modern individual's constant companion, starting from birth: in many places, new-born babies receive gift boxes with baby food, toys and other baby products - in return for their personal data.

TEXTBLOCK 3/3 // URL: http://world-information.org/wio/infostructure/100437611761/100438659693
 
MIT

The MIT (Massachusetts Institute of Technology) is a privately controlled coeducational institution of higher learning famous for its scientific and technological training and research. It was chartered by the state of Massachusetts in 1861 and became a land-grant college in 1863. During the 1930s and 1940s the institute evolved from a well-regarded technical school into an internationally known center for scientific and technical research. In the days of the Great Depression, its faculty established prominent research centers in a number of fields, most notably analog computing (led by Vannevar Bush) and aeronautics (led by Charles Stark Draper). During World War II, MIT administered the Radiation Laboratory, which became the nation's leading center for radar research and development, as well as other military laboratories. After the war, MIT continued to maintain strong ties with military and corporate patrons, who supported basic and applied research in the physical sciences, computing, aerospace, and engineering. MIT has numerous research centers and laboratories. Among its facilities are a nuclear reactor, a computation center, geophysical and astrophysical observatories, a linear accelerator, a space research center, supersonic wind tunnels, an artificial intelligence laboratory, a center for cognitive science, and an international studies center. MIT's library system is extensive and includes a number of specialized libraries; there are also several museums.

INDEXCARD, 1/4
 
David Kahn

David Kahn can be considered one of the most important historians on cryptography. His book The Codebreakers. The comprehensive history of secret Communication from Ancient Times to the Internet, written in 1996 is supposed to be the most important work on the history of cryptography.

INDEXCARD, 2/4
 
Automation

Automation is concerned with the application of machines to tasks once performed by humans or, increasingly, to tasks that would otherwise be impossible. Although the term mechanization is often used to refer to the simple replacement of human labor by machines, automation generally implies the integration of machines into a self-governing system. Automation has revolutionized those areas in which it has been introduced, and there is scarcely an aspect of modern life that has been unaffected by it. Nearly all industrial installations of automation, and in particular robotics, involve a replacement of human labor by an automated system. Therefore, one of the direct effects of automation in factory operations is the dislocation of human labor from the workplace. The long-term effects of automation on employment and unemployment rates are debatable. Most studies in this area have been controversial and inconclusive. As of the early 1990s, there were fewer than 100,000 robots installed in American factories, compared with a total work force of more than 100 million persons, about 20 million of whom work in factories.

INDEXCARD, 3/4
 
Vigenère tableau

a b c d e f g h i j k l m n o p q r s t u v w x y z
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
B C D E F G H I J K L M N O P Q R S T U V W X Y Z A
C D E F G H I J K L M N O P Q R S T U V W X Y Z A B
D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
E F G H I J K L M N O P Q R S T U V W X Y Z A B C D
F G H I J K L M N O P Q R S T U V W X Y Z A B C D E
G H I J K L M N O P Q R S T U V W X Y Z A B C D E F
H I J K L M N O P Q R S T U V W X Y Z A B C D E F G
I J K L M N O P Q R S T U V W X Y Z A B C D E F G H
J K L M N O P Q R S T U V W X Y Z A B C D E F G H I
K L M N O P Q R S T U V W X Y Z A B C D E F G H I J
L M N O P Q R S T U V W X Y Z A B C D E F G H I J K
M N O P Q R S T U V W X Y Z A B C D E F G H I J K L
N O P Q R S T U V W X Y Z A B C D E F G H I J K L M
O P Q R S T U V W X Y Z A B C D E F G H I J K L M N
P Q R S T U V W X Y Z A B C D E F G H I J K L M N O
Q R S T U V W X Y Z A B C D E F G H I J K L M N O P
W X Y Z A B C D E F G H I J K L M N O P Q R S T U V
S T U V W X Y Z A B C D E F G H I J K L M N O P Q R
T U V W X Y Z A B C D E F G H I J K L M N O P Q R S
U V W X Y Z A B C D E F G H I J K L M N O P Q R S T
V W X Y Z A B C D E F G H I J K L M N O P Q R S T U
W X Y Z A B C D E F G H I J K L M N O P Q R S T U V
X Y Z A B C D E F G H I J K L M N O P Q R S T U V W
Y Z A B C D E F G H I J K L M N O P Q R S T U V W X
Z A B C D E F C H I J K L M N O P Q R S T U V W X Y

source:
http://www-stud.fht-esslingen.de/projects/krypto/krypt_gesch/krypt_gesch-2.html

http://www-stud.fht-esslingen.de/projects/kry...
INDEXCARD, 4/4