Epilogue

As scientists are working hard on a quantum computer and also on quantum cryptography one can imagine that another revolution in the study of encryption has to be expected within the next years. By then today's hardware and software tools will look extraordinary dull. At the moment it is impossible to foresee the effects on cryptography and democratic developments by those means; the best and the worst can be expected at the same time. A certain ration of pessimism and prosecution mania are probably the right mixture of emotions about those tendencies, as the idea of big brother has come into existence long ago.

At the same time it will - in part - be a decision of the people to let science work against them or not. Acceleration of data-transmission calls for an acceleration of encryption-methods. And this again falls back on us, on an acceleration of daily life, blurring the private and the public for another time.
We live in an intersection, job and private life growing together. Cryptography cannot help us in that case. The privacy in our mind, the virtuality of all private and public lies in the field of democracy, or at least what is - by connection to the Human Rights - regarded as democracy.

TEXTBLOCK 1/5 // URL: http://world-information.org/wio/infostructure/100437611776/100438658875
 
Timeline 1900-1970 AD

1913 the wheel cipher gets re-invented as a strip

1917 William Frederick Friedman starts working as a cryptoanalyst at Riverbank Laboratories, which also works for the U.S. Government. Later he creates a school for military cryptoanalysis

- an AT&T-employee, Gilbert S. Vernam, invents a polyalphabetic cipher machine that works with random-keys

1918 the Germans start using the ADFGVX-system, that later gets later by the French Georges Painvin

- Arthur Scherbius patents a ciphering machine and tries to sell it to the German Military, but is rejected

1919 Hugo Alexander Koch invents a rotor cipher machine

1921 the Hebern Electric Code, a company producing electro-mechanical cipher machines, is founded

1923 Arthur Scherbius founds an enterprise to construct and finally sell his Enigma machine for the German Military

late 1920's/30's more and more it is criminals who use cryptology for their purposes (e.g. for smuggling). Elizabeth Smith Friedman deciphers the codes of rum-smugglers during prohibition regularly

1929 Lester S. Hill publishes his book Cryptography in an Algebraic Alphabet, which contains enciphered parts

1933-1945 the Germans make the Enigma machine its cryptographic main-tool, which is broken by the Poles Marian Rejewski, Gordon Welchman and Alan Turing's team at Bletchley Park in England in 1939

1937 the Japanese invent their so called Purple machine with the help of Herbert O. Yardley. The machine works with telephone stepping relays. It is broken by a team of William Frederick Friedman. As the Japanese were unable to break the US codes, they imagined their own codes to be unbreakable as well - and were not careful enough.

1930's the Sigaba machine is invented in the USA, either by W.F. Friedman or his colleague Frank Rowlett

- at the same time the British develop the Typex machine, similar to the German Enigma machine

1943 Colossus, a code breaking computer is put into action at Bletchley Park

1943-1980 the cryptographic Venona Project, done by the NSA, is taking place for a longer period than any other program of that type

1948 Shannon, one of the first modern cryptographers bringing mathematics into cryptography, publishes his book A Communications Theory of Secrecy Systems

1960's the Communications-Electronics Security Group (= CESG) is founded as a section of Government Communications Headquarters (= GCHQ)

late 1960's the IBM Watson Research Lab develops the Lucifer cipher

1969 James Ellis develops a system of separate public-keys and private-keys

TEXTBLOCK 2/5 // URL: http://world-information.org/wio/infostructure/100437611776/100438658921
 
Digital Signatures, Timestamps etc

Most computer systems are far from being secure.
A lack of security - it is said - might hinder the developments of new information technologies. Everybody knows electronic transactions involve a more or less calculated risk. Rumors about insecurity let consumers doubt whether the commodity of e-commerce is bigger or its risks. First of all the market depends on the consumer's confidence. To provide that another application for public key cryptography gets essential: the digital signature, which is used to verify the authenticity of the sender of certain data.
It is done with a special private key, and the public key is verifying the signature. This is especially important if the involved parties do not know one another. The DSA (= Digital Signature Algorithm) is a public-key system which is only able to sign digitally, not to encrypt messages. In fact digital signature is the main-tool of cryptography in the private sector.

Digital signatures need to be given for safe electronic payment. It is a way to protect the confidentiality of the sent data, which of course could be provided by other ways of cryptography as well. Other security methods in this respect are still in development, like digital money (similar to credit cards or checks) or digital cash, a system that wants to be anonymous like cash, an idea not favored by governments as it provides many opportunities for money laundry and illegal transactions.

If intellectual property needs to be protected, a digital signature, together with a digital timestamp is regarded as an efficient tool.

In this context, the difference between identification and authentication is essential. In this context smartcards and firewalls are relevant, too.

A lot of digital transactions demand for passwords. More reliable for authentication are biometric identifiers, full of individual and unrepeatable codes, signatures that can hardly be forged.

For more terms of cryptography and more information see:
http://poseidon.csd.auth.gr/signatures
http://www.dlib.org/dlib/december97/ibm/12lotspiech.html
http://www.cryptography.com/technology/technology.html
http://www.cdt.org/crypto/glossary.shtml
http://www.oecd.org//dsti/sti/it/secur/prod/GD97-204.htm

TEXTBLOCK 3/5 // URL: http://world-information.org/wio/infostructure/100437611776/100438659015
 
Timeline 1600 - 1900 AD

17th century Cardinal Richelieu invents an encryption-tool called grille, a card with holes for writing messages on paper into the holes of those cards. Afterwards he removes the cards and fills in the blanks, so the message looks like an ordinary letter. The recipient needs to own the same card

- Bishop John Wilkins invents a cryptologic system looking like music notes. In a book he describes several forms of steganographic systems like secrets inks, but also the string cipher. He mentions the so-called Pig Latin, a spoken way of encryption that was already used by the ancient Indians

- the English scientist, magician and astrologer John Dee works on the ancient Enochian alphabet; he also possesses an encrypted writing that could not been broken until today

1605/1623 Sir Francis Bacon (= Francis Tudor = William Shakespeare?) writes several works containing ideas about cryptography. One of his most important advises is to use ciphers in such a way that no-one gets suspicious that the text could be enciphered. For this the steganogram was the best method, very often used in poems. The attempt to decipher Shakespeare's sonnets (in the 20th century) lead to the idea that his works had been written by Francis Bacon originally.

1671 Leibniz invents a calculating machine that uses the binary scale which we still use today, more advanced of course, called the ASCII code

18th century this is the time of the Black Chambers of espionage in Europe, Vienna having one of the most effective ones, called the "Geheime Kabinettskanzlei", headed by Baron Ignaz von Koch. Its task is to read through international diplomatic mail, copy letters and return them to the post-office the same morning. Supposedly about 100 letters are dealt with each day.

1790's Thomas Jefferson and Robert Patterson invent a wheel cipher

1799 the Rosetta Stone is found and makes it possible to decipher the Egyptian Hieroglyphs

1832 or 1838 Sam Morse develops the Morse Code, which actually is no code but an enciphered alphabet of short and long sounds. The first Morse code-message is sent by telegraph in 1844.

1834 the Braille Code for blind people is developed in today's form by Louis Braille

1844 the invention of the telegraph changes cryptography very much, as codes are absolutely necessary by then

1854 the Playfair cipher is invented by Sir Charles Wheatstone

1859 for the first time a tomographic cipher gets described

1861 Friedrich W. Kasiski does a cryptoanalysis of the Vigenère ciphers, which had been supposed to be uncrackable for ages

1891 Major Etienne Bazeries creates a new version of the wheel cipher, which is rejected by the French Army

1895 the invention of the radio changes cryptography-tasks again and makes them even more important

TEXTBLOCK 4/5 // URL: http://world-information.org/wio/infostructure/100437611776/100438658974
 
Legal Protection: Multilateral Agreements

With the rise of a global economic system a desire to establish agreements, which protect works not only within national borders, but also within a "Union" of countries or on an international level, has been expressed. As a consequence a variety of multilateral treaties have been negotiated and adopted by governments. Those shall simplify practice through international standardization and mutual recognition of rights and duties among nations.


TEXTBLOCK 5/5 // URL: http://world-information.org/wio/infostructure/100437611725/100438659570
 
RSA

The best known of the two-key cryptosystems developed in the mid-1980s is the Rivest-Shamir-Adleman (RSA) cryptoalgorithm, which was first published in April, 1977. Since that time, the algorithm has been employed in the most widely-used Internet electronic communications encryption program, Pretty Good Privacy (PGP). It is also employed in both the Netscape Navigator and Microsoft Explorer web browsing programs in their implementations of the Secure Sockets Layer (SSL), and by Mastercard and VISA in the Secure Electronic Transactions (SET) protocol for credit card transactions.

INDEXCARD, 1/5
 
Critical Art Ensemble

Critical Art Ensemble is a collective of five artists of various specializations dedicated to exploring the intersections between art, technology, radical politics, and critical theory. CAE have published a number of books and carried out innovative art projects containing insightful and ironic theoretical contributions to media art. Projects include Addictionmania, Useless Technology, The Therapeutic State, Diseases of Consciousness, Machineworld, As Above So Below, and Flesh Machine.

http://www.critical-art.net

INDEXCARD, 2/5
 
Viacom

One of the largest and foremost communications and media conglomerates in the
world. Founded in 1971, the present form of the corporation dates from 1994 when Viacom Inc., which owned radio and television stations and cable television programming services and systems, acquired the entertainment and publishing giant Paramount Communications Inc. and then merged with the video and music retailer Blockbuster Entertainment Corp. Headquarters are in New York City.

INDEXCARD, 3/5
 
Martin Hellman

Martin Hellman was Whitfield Diffie's collegue in creating pubylic key cryptography in the 1970s.

INDEXCARD, 4/5
 
VISA

Visa International's over 21,000 member financial institutions have made VISA one of the world's leading full-service payment network. Visa's products and services include Visa Classic card, Visa Gold card, Visa debit cards, Visa commercial cards and the Visa Global ATM Network. VISA operates in 300 countries and territories and also provides a large consumer payments processing system.

INDEXCARD, 5/5