Cryptography and Democracy Cryptography and democracy are clearly related to each other when we talk about teledemocracy. Many answers of civilians to certain state institutions can already be posed on the Internet. Many bureaucratic duties can be fulfilled through the Internet as well. But on February 8th 2000 the worldwide first elections on the Internet were performed. The elections themselves were nothing important, students' elections at the University of Osnabrück, Germany. But the project, called i-vote, with a preparation time of 10 months, wrote history. For a correct result, there existed several different encryption processes at the same time, like the digital signature, a blinding for anonymizing the vote and a virtual election paper that had to be encrypted as well, as simple e-mails could have been traced back. The question whether teledemocracy can provide us with a more intensive democracy has to be answered within a different field of questions; here the question is rather about the role of cryptography in this area. The use of cryptography in teledemocracy is inevitable, but does it also re-influence cryptography? Or will it influence the different governments' laws again? The sentence "We are committed to protecting the privacy of your personal information" that can be read as the introduction-sentence at the Free-PC-homepage ( But still we find ourselves overruled by the issue that someone believes to know what is good for us. And our privacy is floating away ... Human Rights call for the right for privacy. We can go on fighting for privacy but anonymity has disappeared long ago. If we leave cookies and other data by visiting websites, we might be anything but surely not anonymous. for more information about privacy and Human Rights see: for re-anonymizing see: "The fight for privacy today will always include the fight for unrestricted access to cryptography tools, for at least getting a slight chance that the buying of a book or any other small thing turns into a chain of messages for someone else's purpose, whether it might be governmental or commercial." (Cypherpunk's Manifesto) for more information on the Cypherpunk's Manifesto see: This year again many conferences on the topic of cryptography take place. For further information see: |
|
Timeline 00 - 1600 AD 3rd cent. Leiden papyrus: medical information gets enciphered to stop abuses 8th cent. - Abu 'Abd al-Rahman al-Khalil ibn Ahmad ibn 'Amr ibn Tammam al Farahidi al-Zadi al Yahmadi finds the solution for a Greek cryptogram by first of all finding out the plaintext behind the encryption, a method which never got out of date. Afterwards he writes a book on cryptography. - cipher alphabets for magicians are published 1250 the English monk Roger Bacon writes cipher-descriptions. At that time the art of enciphering was a popular game in monasteries 1379 Gabrieli di Lavinde develops the nomenclature-code for Clement VII (114); a code-system made out of ciphers and codes, which kept being irreplaceable until the 19th century 1392 (probably) the English poet Geoffrey Chaucer writes the book The Equatorie of the Planetis, which contains several passages in ciphers made out of letters, digits and symbols 1412 for the first time ciphers including different substitutions for each letter are developed (in Arabic) ~1467 invention of the "Captain Midnight Decoder Badge", the first polyalphabetic cipher (disk); the inventor, Leon Battista Alberti, also called the father of Western cryptography, uses his disk for enciphering and deciphering at the same time 15th/16th century nearly every state, especially England and France, has people working on en- and deciphering for them 1518 the first printed book on cryptology is written by the German monk Johannes Trithemius. He also changes the form of polyalphabetic cipher from disks into rectangulars 1533 the idea to take a pass-phrase as the key for polyalphabetic cipher is realized by Giovan Batista Belaso 1563 Giovanni Battista Porta suggests to use synonyms and misspellings to irritate cryptoanalysts 1585 Blaise de Vigenère has the idea to use former plaintexts or ciphertexts as new keys; he invents the 1587 Mary, Queen of Scots, is beheaded for the attempt to organize the murder of Queen Elisabeth I., whose agents find out about Mary's plans with the help of decryption 1588 the first book in shorthand is published |
|
Vigenère tableau a b c d e f g h i j k l m n o p q r s t u v w x y z A B C D E F G H I J K L M N O P Q R S T U V W X Y Z B C D E F G H I J K L M N O P Q R S T U V W X Y Z A C D E F G H I J K L M N O P Q R S T U V W X Y Z A B D E F G H I J K L M N O P Q R S T U V W X Y Z A B C E F G H I J K L M N O P Q R S T U V W X Y Z A B C D F G H I J K L M N O P Q R S T U V W X Y Z A B C D E G H I J K L M N O P Q R S T U V W X Y Z A B C D E F H I J K L M N O P Q R S T U V W X Y Z A B C D E F G I J K L M N O P Q R S T U V W X Y Z A B C D E F G H J K L M N O P Q R S T U V W X Y Z A B C D E F G H I K L M N O P Q R S T U V W X Y Z A B C D E F G H I J L M N O P Q R S T U V W X Y Z A B C D E F G H I J K M N O P Q R S T U V W X Y Z A B C D E F G H I J K L N O P Q R S T U V W X Y Z A B C D E F G H I J K L M O P Q R S T U V W X Y Z A B C D E F G H I J K L M N P Q R S T U V W X Y Z A B C D E F G H I J K L M N O Q R S T U V W X Y Z A B C D E F G H I J K L M N O P W X Y Z A B C D E F G H I J K L M N O P Q R S T U V S T U V W X Y Z A B C D E F G H I J K L M N O P Q R T U V W X Y Z A B C D E F G H I J K L M N O P Q R S U V W X Y Z A B C D E F G H I J K L M N O P Q R S T V W X Y Z A B C D E F G H I J K L M N O P Q R S T U W X Y Z A B C D E F G H I J K L M N O P Q R S T U V X Y Z A B C D E F G H I J K L M N O P Q R S T U V W Y Z A B C D E F G H I J K L M N O P Q R S T U V W X Z A B C D E F C H I J K L M N O P Q R S T U V W X Y source: |
|