Timeline 00 - 1600 AD

3rd cent. Leiden papyrus: medical information gets enciphered to stop abuses

8th cent. - Abu 'Abd al-Rahman al-Khalil ibn Ahmad ibn 'Amr ibn Tammam al Farahidi al-Zadi al Yahmadi finds the solution for a Greek cryptogram by first of all finding out the plaintext behind the encryption, a method which never got out of date. Afterwards he writes a book on cryptography.

- cipher alphabets for magicians are published

1250 the English monk Roger Bacon writes cipher-descriptions. At that time the art of enciphering was a popular game in monasteries

1379 Gabrieli di Lavinde develops the nomenclature-code for Clement VII (114); a code-system made out of ciphers and codes, which kept being irreplaceable until the 19th century

1392 (probably) the English poet Geoffrey Chaucer writes the book The Equatorie of the Planetis, which contains several passages in ciphers made out of letters, digits and symbols

1412 for the first time ciphers including different substitutions for each letter are developed (in Arabic)

~1467 invention of the "Captain Midnight Decoder Badge", the first polyalphabetic cipher (disk); the inventor, Leon Battista Alberti, also called the father of Western cryptography, uses his disk for enciphering and deciphering at the same time

15th/16th century nearly every state, especially England and France, has people working on en- and deciphering for them

1518 the first printed book on cryptology is written by the German monk Johannes Trithemius. He also changes the form of polyalphabetic cipher from disks into rectangulars

1533 the idea to take a pass-phrase as the key for polyalphabetic cipher is realized by Giovan Batista Belaso

1563 Giovanni Battista Porta suggests to use synonyms and misspellings to irritate cryptoanalysts

1585 Blaise de Vigenère has the idea to use former plaintexts or ciphertexts as new keys; he invents the Vigenère tableau. David Kahn points out that this technique had been forgotten soon afterwards (until the end of the 19th century)

1587 Mary, Queen of Scots, is beheaded for the attempt to organize the murder of Queen Elisabeth I., whose agents find out about Mary's plans with the help of decryption

1588 the first book in shorthand is published

TEXTBLOCK 1/6 // URL: http://world-information.org/wio/infostructure/100437611776/100438658997
 
Asymmetric or Public-Key-Cryptosystems

Here the keys for encryption and decryption differ. There needs to exist a private key, which is only known to the individual, and a public key, which is published. Every person has her or his own private key that is never published. It is used for decrypting only. Mathematically the different keys are linked to each other, still it is nearly impossible to derive the private key from the public one.
For sending a message to someone, one has to look up the other's public key and encrypt the message with it. The keyholder will use his/her private key to decrypt it. While everybody can send a message with the public key, the private key absolutely has to stay secret - and probably will.

"The best system is to use a simple, well understood algorithm which relies on the security of a key rather than the algorithm itself. This means if anybody steals a key, you could just roll another and they have to start all over." (Andrew Carol)

very famous examples for public-key systems are:

· RSA:
The RSA is probably one of the most popular public-key cryptosystems. With the help of RSA, messages can be encrypted, but also digital signatures are provided.
The mathematics behind are supposedly quite easy to understand (see: http://world.std.com/~franl/crypto/rsa-guts.html.

· PGP:
PGP is a public key encryption program. Most of all it is used for e-mail encryption.
It is supposed to be quite safe - until now.

· PGPi is simply the international variation of PGP.

for further information about the RSA and other key-systems visit the RSA homepage:
http://www.rsa.com/rsalabs/faq/
http://www.rsa.com/rsalabs/faq/questions.html
or:
http://www.pgpi.org

All of those tools, like hash functions, too, can help to enhance security and prevent crime.
They can theoretically, but sometimes they do not, as the example of the published credit card key of France in March 2000 showed.
For more information see:
http://news.voila.fr/news/fr.misc.cryptologie

Still, cryptography can help privacy.
On the other hand cryptography is only one element to assure safe transport of data. It is especially the persons using it who have to pay attention. A key that is told to others or a lost cryptographic key are the end of secrecy.

TEXTBLOCK 2/6 // URL: http://world-information.org/wio/infostructure/100437611776/100438659074
 
Steganography

Ciphers as well as codes are transmitted openly. Everyone can see that they exist. Not so with steganograms.
Steganography is the art and science of communicating in a way which hides the existence of the secret part in that communication. During the Italian Renaissance and the time of the Elizabethan Age in England cryptography was very popular, for political reasons as well as for amusements (see John Dee).
In literature steganography played an important role. Many steganographs of that period have only been deciphered recently like some of the Shakespearean sonnets, which now seem to proof that the actor William Shakespeare was not the author of the famous poems and dramas, but that the latter' name was, and Francis Bacon, or even Francis Tudor, as some ciphers and other sources talk of him as Queen Elisabeth I.'s secret son.

for further details see:
http://home.att.net/~tleary/
http://www.thur.de/ulf/stegano/
http://www2.prestel.co.uk/littleton/gm2_rw.htm

One kind of steganogram is digital watermarking:
Watermarks protect digital images, videos, but also audio and multimedia products. They are made out of digital signals, put into other digital signals. They try to be invisible on first sight and should be nearly impossible to remove. The process of producing watermarks is to overlay some sort of identifying image over the original image (non-digital watermarks, like on money can be seen by holding the paper against light). Copying the image destroys the watermark, which cannot be copied. Any alteration of the original destroys the watermark, too.

Watermarking is one of the typical inventions of cryptography to assist the biggest content owners, but advertised as something necessary and helpful for everybody. Who in fact gets any advantage out of watermarking? The private user most of the time will not really need it except for small entities of pictures maybe.
But the big enterprises do. There is a tendency to watermark more and more information in the Internet, which until now was considered as free and as a cheap method to receive information. Watermarking could stop this democratic development.

for further information see:
http://www.isse.gmu.edu/~njohnson/Steganography

TEXTBLOCK 3/6 // URL: http://world-information.org/wio/infostructure/100437611776/100438659021
 
Cryptography's Terms and background

"All nature is merely a cipher and a secret writing."
Blaise de Vigenère

In the (dis-)information age getting information but at the same time excluding others from it is part of a power-game (keeping the other uneducated). The reason for it eventually has found an argument called security.
Compared to the frequency of its presence in articles, the news and political speeches security seems to be one of the most popular words of the 90's. It must be a long time ago when that word was only used for and by the military and the police. Today one can find it as part of every political issue. Even development assistance and nutrition programs consider it part of its work.
The so-called but also real need for information security is widespread and concerning everybody, whether someone uses information technology or not. In any case information about individuals is moving globally; mostly sensitive information like about bank records, insurance and medical data, credit card transactions, and much much more. Any kind of personal or business communication, including telephone conversations, fax messages, and of course e-mail is concerned. Not to forget further financial transactions and business information. Almost every aspect of modern life is affected.
We want to communicate with everybody - but do not want anybody to know.

Whereas the market already depends on the electronic flow of information and the digital tools get faster and more sophisticated all the time, the rise of privacy and security concerns have to be stated as well.
With the increase of digital communication its vulnerability is increasing just as fast. And there exist two (or three) elements competing and giving the term digital security a rather drastic bitter taste: this is on the one hand the growing possibility for criminals to use modern technology not only to hide their source and work secretly but also to manipulate financial and other transfers. On the other hand there are the governments of many states telling the population that they need access to any kind of data to keep control against those criminals. And finally there are those people, living between enlightening security gaps and at the same time harming other private people's actions with their work: computer hackers.
While the potential of global information is regarded as endless, it is those elements that reduce it.

There is no definite solution, but at least some tools have been developed to improve the situation: cryptography, the freedom to encode those data that one does not want to be known by everybody, and give a possibility to decode them to those who shall know the data.

During the last 80 years cryptography has changed from a mere political into a private, economic but still political tool: at the same time it was necessary to improve the tools, eventually based on mathematics. Hence generally cryptography is regarded as something very complicated. And in many ways this is true as the modern ways of enciphering are all about mathematics.

"Crypto is not mathematics, but crypto can be highly mathematical, crypto can use mathematics, but good crypto can be done without a great reliance on complex mathematics." (W.T. Shaw)

For an introduction into cryptography and the mathematical tasks see:
http://www.sbox.tu-graz.ac.at/home/j/jonny/projects/crypto/index.htm
http://www.ccc.de/CCC-CA/policy.html

TEXTBLOCK 4/6 // URL: http://world-information.org/wio/infostructure/100437611776/100438658895
 
Cryptography and Democracy

Cryptography and democracy are clearly related to each other when we talk about teledemocracy. Many answers of civilians to certain state institutions can already be posed on the Internet. Many bureaucratic duties can be fulfilled through the Internet as well. But on February 8th 2000 the worldwide first elections on the Internet were performed. The elections themselves were nothing important, students' elections at the University of Osnabrück, Germany. But the project, called i-vote, with a preparation time of 10 months, wrote history. For a correct result, there existed several different encryption processes at the same time, like the digital signature, a blinding for anonymizing the vote and a virtual election paper that had to be encrypted as well, as simple e-mails could have been traced back.
The question whether teledemocracy can provide us with a more intensive democracy has to be answered within a different field of questions; here the question is rather about the role of cryptography in this area. The use of cryptography in teledemocracy is inevitable, but does it also re-influence cryptography? Or will it influence the different governments' laws again?

The sentence "We are committed to protecting the privacy of your personal information" that can be read as the introduction-sentence at the Free-PC-homepage (http://www.free-pc.com/privacy.tp) poses already the question on how that company can know about personal information. Soon they lift the curtain, telling us that we leave cookies visiting their website - as we do everywhere else. With that information, provided through the cookie, they try to select the appropriate advertisement-sortiment for the individual. Their line of reasoning is that individualized advertisements offer the clients the best and most interesting products without being overruled by not-interesting commercials.
But still we find ourselves overruled by the issue that someone believes to know what is good for us. And our privacy is floating away ...

Human Rights call for the right for privacy. We can go on fighting for privacy but anonymity has disappeared long ago. If we leave cookies and other data by visiting websites, we might be anything but surely not anonymous.
for more information about privacy and Human Rights see:
http://www.privacyinternational.org/survey/
http://www.gilc.org/privacy/survey/

for re-anonymizing see:
http://www.rewebber.de

"The fight for privacy today will always include the fight for unrestricted access to cryptography tools, for at least getting a slight chance that the buying of a book or any other small thing turns into a chain of messages for someone else's purpose, whether it might be governmental or commercial." (Cypherpunk's Manifesto)

for more information on the Cypherpunk's Manifesto see:
http://www.activism.net/cypherpunk/manifesto.html

This year again many conferences on the topic of cryptography take place. For further information see:
http://www.swcp.com/~iacr/events/index.html

TEXTBLOCK 5/6 // URL: http://world-information.org/wio/infostructure/100437611776/100438658859
 
Epilogue

As scientists are working hard on a quantum computer and also on quantum cryptography one can imagine that another revolution in the study of encryption has to be expected within the next years. By then today's hardware and software tools will look extraordinary dull. At the moment it is impossible to foresee the effects on cryptography and democratic developments by those means; the best and the worst can be expected at the same time. A certain ration of pessimism and prosecution mania are probably the right mixture of emotions about those tendencies, as the idea of big brother has come into existence long ago.

At the same time it will - in part - be a decision of the people to let science work against them or not. Acceleration of data-transmission calls for an acceleration of encryption-methods. And this again falls back on us, on an acceleration of daily life, blurring the private and the public for another time.
We live in an intersection, job and private life growing together. Cryptography cannot help us in that case. The privacy in our mind, the virtuality of all private and public lies in the field of democracy, or at least what is - by connection to the Human Rights - regarded as democracy.

TEXTBLOCK 6/6 // URL: http://world-information.org/wio/infostructure/100437611776/100438658875