Timeline 00 - 1600 AD

3rd cent. Leiden papyrus: medical information gets enciphered to stop abuses

8th cent. - Abu 'Abd al-Rahman al-Khalil ibn Ahmad ibn 'Amr ibn Tammam al Farahidi al-Zadi al Yahmadi finds the solution for a Greek cryptogram by first of all finding out the plaintext behind the encryption, a method which never got out of date. Afterwards he writes a book on cryptography.

- cipher alphabets for magicians are published

1250 the English monk Roger Bacon writes cipher-descriptions. At that time the art of enciphering was a popular game in monasteries

1379 Gabrieli di Lavinde develops the nomenclature-code for Clement VII (114); a code-system made out of ciphers and codes, which kept being irreplaceable until the 19th century

1392 (probably) the English poet Geoffrey Chaucer writes the book The Equatorie of the Planetis, which contains several passages in ciphers made out of letters, digits and symbols

1412 for the first time ciphers including different substitutions for each letter are developed (in Arabic)

~1467 invention of the "Captain Midnight Decoder Badge", the first polyalphabetic cipher (disk); the inventor, Leon Battista Alberti, also called the father of Western cryptography, uses his disk for enciphering and deciphering at the same time

15th/16th century nearly every state, especially England and France, has people working on en- and deciphering for them

1518 the first printed book on cryptology is written by the German monk Johannes Trithemius. He also changes the form of polyalphabetic cipher from disks into rectangulars

1533 the idea to take a pass-phrase as the key for polyalphabetic cipher is realized by Giovan Batista Belaso

1563 Giovanni Battista Porta suggests to use synonyms and misspellings to irritate cryptoanalysts

1585 Blaise de Vigenère has the idea to use former plaintexts or ciphertexts as new keys; he invents the Vigenère tableau. David Kahn points out that this technique had been forgotten soon afterwards (until the end of the 19th century)

1587 Mary, Queen of Scots, is beheaded for the attempt to organize the murder of Queen Elisabeth I., whose agents find out about Mary's plans with the help of decryption

1588 the first book in shorthand is published

TEXTBLOCK 1/3 // URL: http://world-information.org/wio/infostructure/100437611776/100438658997
 
Cryptography's Terms and background

"All nature is merely a cipher and a secret writing."
Blaise de Vigenère

In the (dis-)information age getting information but at the same time excluding others from it is part of a power-game (keeping the other uneducated). The reason for it eventually has found an argument called security.
Compared to the frequency of its presence in articles, the news and political speeches security seems to be one of the most popular words of the 90's. It must be a long time ago when that word was only used for and by the military and the police. Today one can find it as part of every political issue. Even development assistance and nutrition programs consider it part of its work.
The so-called but also real need for information security is widespread and concerning everybody, whether someone uses information technology or not. In any case information about individuals is moving globally; mostly sensitive information like about bank records, insurance and medical data, credit card transactions, and much much more. Any kind of personal or business communication, including telephone conversations, fax messages, and of course e-mail is concerned. Not to forget further financial transactions and business information. Almost every aspect of modern life is affected.
We want to communicate with everybody - but do not want anybody to know.

Whereas the market already depends on the electronic flow of information and the digital tools get faster and more sophisticated all the time, the rise of privacy and security concerns have to be stated as well.
With the increase of digital communication its vulnerability is increasing just as fast. And there exist two (or three) elements competing and giving the term digital security a rather drastic bitter taste: this is on the one hand the growing possibility for criminals to use modern technology not only to hide their source and work secretly but also to manipulate financial and other transfers. On the other hand there are the governments of many states telling the population that they need access to any kind of data to keep control against those criminals. And finally there are those people, living between enlightening security gaps and at the same time harming other private people's actions with their work: computer hackers.
While the potential of global information is regarded as endless, it is those elements that reduce it.

There is no definite solution, but at least some tools have been developed to improve the situation: cryptography, the freedom to encode those data that one does not want to be known by everybody, and give a possibility to decode them to those who shall know the data.

During the last 80 years cryptography has changed from a mere political into a private, economic but still political tool: at the same time it was necessary to improve the tools, eventually based on mathematics. Hence generally cryptography is regarded as something very complicated. And in many ways this is true as the modern ways of enciphering are all about mathematics.

"Crypto is not mathematics, but crypto can be highly mathematical, crypto can use mathematics, but good crypto can be done without a great reliance on complex mathematics." (W.T. Shaw)

For an introduction into cryptography and the mathematical tasks see:
http://www.sbox.tu-graz.ac.at/home/j/jonny/projects/crypto/index.htm
http://www.ccc.de/CCC-CA/policy.html

TEXTBLOCK 2/3 // URL: http://world-information.org/wio/infostructure/100437611776/100438658895
 
Introduction

"A man is crazy who writes a secrete
in any other way than one which
will conceal it from the vulgar."
Roger Bacon (~1250 AD)



The essence of human communication is not only the social behavior to give or get messages (of whatever meaning) but also how to give and get them, and to include certain people by excluding others from the process of informing.
e.g. whispering is an effective way of talking to exclude the majority.
What about ways of writing?
Already some of the first written messages in human history obviously found special forms of hiding contents from the so-called others. When the knowledge of writing meant a privilege in a stronger sense as it is true today (in China for a long period writing was forbidden to people not working for the government), the alphabet itself was a kind of cryptography (that is why Catholic churches were painted with pictures explaining the stories of the Bible).

Certainly the methods of deciphering and enciphering improved a lot during the last 4.000 years. In the meantime cryptography has become a topic without end and with less technological limits every day. On the one hand there is the field of biometrics, which is highly related to cryptography but still in its beginnings, on the other hand there emerge so-called infowars, which intend to substitute or at least accompany war and are unthinkable without cryptography.
But there is much more to detect, like the different forms of de- and encoding. And very important, too, there is the history of cryptography that tells us about the basics to make it easier to understand today's issues.

In the actual age of (dis-)information storing and transporting electronic information safely increases its importance. Governments, institutions, economy and individuals rely on the hope that no-one can read or falsify their messages/data as it is much more difficult to detect and proof abuses in electronic media than in elder forms of written communication.

TEXTBLOCK 3/3 // URL: http://world-information.org/wio/infostructure/100437611776/100438658802
 
Sun Microsystems

Founded in 1982 and headquartered in Palo Alto, USA, Sun Microsystems manufactures computer workstations, servers, and software.

http://www.sun.com

For more detailed information see the Encyclopaedia Britannica: http://www.britannica.com/bcom/eb/article/9/0,5716,108249+1+105909,00.html .

http://www.sun.com/
http://www.britannica.com/bcom/eb/article/9/0...
INDEXCARD, 1/2
 
Royal Dutch/Shell Group

One of the world's largest corporate entities in sales, consisting of companies in more than 100 countries, whose shares are owned by NV Koninklijke Nederlandsche Petroleum Maatschappij (Royal Dutch Petroleum Company Ltd.) of The Hague and by the "Shell" Transport and Trading Company, PLC, of London. Below these two parent companies are two holding companies, Shell Petroleum NV and the Shell Petroleum Company Limited, whose shares are owned 60 percent by Royal Dutch and 40 percent by "Shell" Transport and Trading. The holding companies, in turn, hold shares in and administer the subsidiary service companies and operating companies around the world, which engage in oil, petrochemical, and associated industries, from research and exploration to production and marketing. Several companies also deal in metals, nuclear energy, solar energy, coal, and consumer products.

INDEXCARD, 2/2