|
1950: The Turing Test |
|
|
|
Introduction "A man is crazy who writes a secrete in any other way than one which will conceal it from the vulgar." Roger Bacon (~1250 AD) The essence of human communication is not only the social behavior to give or get messages (of whatever meaning) but also how to give and get them, and to include certain people by excluding others from the process of informing. e.g. whispering is an effective way of talking to exclude the majority. What about ways of writing? Already some of the first written messages in human history obviously found special forms of hiding contents from the so-called others. When the knowledge of writing meant a privilege in a stronger sense as it is true today (in China for a long period writing was forbidden to people not working for the government), the alphabet itself was a kind of cryptography (that is why Catholic churches were painted with pictures explaining the stories of the Bible). Certainly the methods of deciphering and enciphering improved a lot during the last 4.000 years. In the meantime cryptography has become a topic without end and with less technological limits every day. On the one hand there is the field of biometrics, which is highly related to cryptography but still in its beginnings, on the other hand there emerge so-called infowars, which intend to substitute or at least accompany war and are unthinkable without cryptography. But there is much more to detect, like the different forms of de- and encoding. And very important, too, there is the history of cryptography that tells us about the basics to make it easier to understand today's issues. In the actual age of (dis-)information storing and transporting electronic information safely increases its importance. Governments, institutions, economy and individuals rely on the hope that no-one can read or falsify their messages/data as it is much more difficult to detect and proof abuses in electronic media than in elder forms of written communication. |
|
|
|
Who are you? Who are you? Direct marketing companies have many othe ways of appropriating data bodies. Allowing form regional and national variations, data are obtained from registration cards, telephone directories, social insurance data bass, religious groups, educational institutions, trade unions, registry offices, banks and of course from the date trace left behind in digital environments, e.g. by clicking on an advertising banner. Direct marketing companies collect als this data systemtically and enhance them, i.e. they associate a range of different indicators with a person's name. Techniques used range from simple inferences ("if you are German and your name is Claudia, you are 80 % likely to be between 25 and 33 years old") to complicated data mining programmes such as
sex size of household age group purchasing power neighbourhood quality size of town region professional and academic titles phone and fax numbers e-mail address pronness for mail-order purchasing number of children age of children marital status purchasing patterns investment behaviour credit status credit history convictions nature of products and services purchased many other social and economic indicators There can be a hundred or more indicators associated to an individual's name. Direct marketing companies such as |
|
|
|
MIT The MIT (Massachusetts Institute of Technology) is a privately controlled coeducational institution of higher learning famous for its scientific and technological training and research. It was chartered by the state of Massachusetts in 1861 and became a land-grant college in 1863. During the 1930s and 1940s the institute evolved from a well-regarded technical school into an internationally known center for scientific and technical research. In the days of the Great Depression, its faculty established prominent research centers in a number of fields, most notably analog computing (led by |
|
|
|
David Kahn David Kahn can be considered one of the most important historians on cryptography. His book The Codebreakers. The comprehensive history of secret Communication from Ancient Times to the Internet, written in 1996 is supposed to be the most important work on the history of cryptography. |
|
|
|
Automation Automation is concerned with the application of machines to tasks once performed by humans or, increasingly, to tasks that would otherwise be impossible. Although the term mechanization is often used to refer to the simple replacement of human labor by machines, |
|
|
|
Vigenère tableau a b c d e f g h i j k l m n o p q r s t u v w x y z A B C D E F G H I J K L M N O P Q R S T U V W X Y Z B C D E F G H I J K L M N O P Q R S T U V W X Y Z A C D E F G H I J K L M N O P Q R S T U V W X Y Z A B D E F G H I J K L M N O P Q R S T U V W X Y Z A B C E F G H I J K L M N O P Q R S T U V W X Y Z A B C D F G H I J K L M N O P Q R S T U V W X Y Z A B C D E G H I J K L M N O P Q R S T U V W X Y Z A B C D E F H I J K L M N O P Q R S T U V W X Y Z A B C D E F G I J K L M N O P Q R S T U V W X Y Z A B C D E F G H J K L M N O P Q R S T U V W X Y Z A B C D E F G H I K L M N O P Q R S T U V W X Y Z A B C D E F G H I J L M N O P Q R S T U V W X Y Z A B C D E F G H I J K M N O P Q R S T U V W X Y Z A B C D E F G H I J K L N O P Q R S T U V W X Y Z A B C D E F G H I J K L M O P Q R S T U V W X Y Z A B C D E F G H I J K L M N P Q R S T U V W X Y Z A B C D E F G H I J K L M N O Q R S T U V W X Y Z A B C D E F G H I J K L M N O P W X Y Z A B C D E F G H I J K L M N O P Q R S T U V S T U V W X Y Z A B C D E F G H I J K L M N O P Q R T U V W X Y Z A B C D E F G H I J K L M N O P Q R S U V W X Y Z A B C D E F G H I J K L M N O P Q R S T V W X Y Z A B C D E F G H I J K L M N O P Q R S T U W X Y Z A B C D E F G H I J K L M N O P Q R S T U V X Y Z A B C D E F G H I J K L M N O P Q R S T U V W Y Z A B C D E F G H I J K L M N O P Q R S T U V W X Z A B C D E F C H I J K L M N O P Q R S T U V W X Y source: |
|
|