Asymmetric or Public-Key-Cryptosystems Here the keys for encryption and decryption differ. There needs to exist a private key, which is only known to the individual, and a public key, which is published. Every person has her or his own private key that is never published. It is used for decrypting only. Mathematically the different keys are linked to each other, still it is nearly impossible to derive the private key from the public one. For sending a message to someone, one has to look up the other's public key and encrypt the message with it. The keyholder will use his/her private key to decrypt it. While everybody can send a message with the public key, the private key absolutely has to stay secret - and probably will. "The best system is to use a simple, well understood algorithm which relies on the security of a key rather than the algorithm itself. This means if anybody steals a key, you could just roll another and they have to start all over." (Andrew Carol) very famous examples for public-key systems are: · RSA: The RSA is probably one of the most popular public-key cryptosystems. With the help of RSA, messages can be encrypted, but also digital signatures are provided. The mathematics behind are supposedly quite easy to understand (see: · PGP: PGP is a public key encryption program. Most of all it is used for e-mail encryption. It is supposed to be quite safe - until now. · PGPi is simply the international variation of PGP. for further information about the RSA and other key-systems visit the RSA homepage: or: All of those tools, like hash functions, too, can help to enhance security and prevent crime. They can theoretically, but sometimes they do not, as the example of the published credit card key of France in March 2000 showed. For more information see: Still, cryptography can help privacy. On the other hand cryptography is only one element to assure safe transport of data. It is especially the persons using it who have to pay attention. A key that is told to others or a lost cryptographic key are the end of secrecy. |
|
Basics: Protected Works Usually the subject matter of copyright is described as "literary and artistic works" - original creations in the fields of literature and arts. Such works may be expressed in words, symbols, pictures, music, three-dimensional objects, or combinations thereof. Practically all national copyright laws provide for the protection of the following types of works: Literary works: novels, poems dramatic works and any other writings, whether published or unpublished; in most countries also computer programs and "oral works" Musical works Artistic works: whether two-dimensional or three-dimensional; irrespective of their content and destination Maps and technical drawings Photographic works: irrespective of the subject matter and the purpose for which made Audiovisual works: irrespective of their purpose, genre, length, method employed or technical process used Some copyright laws also provide for the protection of choreographic works, derivative works (translations, adaptions), collections (compilations) of works and mere data (data bases); collections where they, by reason of the selection and arrangement of the contents, constitute intellectual creations. Furthermore in some countries also "works of applied art" (furniture, wallpaper etc.) and computer programs (either as literary works or independently) constitute copyrightable matter. Under certain national legislations the notion "copyright" has a wider meaning than "author's rights" and, in addition to literary and artistic works, also extends to the producers of sound recordings, the broadcasters of broadcasts and the creators of distinctive typographical arrangements of publications. |
|
Key-Systems As stated, telecommunication is seen as an unreliable media for transporting secret messages. Therefore today, cryptography is needed more than ever before, especially for e-commerce. Key cryptosystems try to provide more privacy. symmetric-key cryptosystems: The same key is used for both encryption and decryption. In this case the encipherer and the recipient of the message/text have to agree on a common key before the enciphering-process can start. And most of all they should trust each other. And exactly this is the main problem of this system: how to exchange the key without offering an opportunity for stealing it? In former times messengers or pigeons were doing the exchange of those keys. Symmetric-key systems make sense in small entities. If a lot of people are spread over a wide area and belong to the same network, distributing the keys starts getting complicated. Today, those cryptosystems get controlled by other keys, based on highly complex mathematical algorithms. some symmetric-key systems are: - DES (Data Encryption Standard), the standard for credit cards - Triple-DES, which is a variation of DES, encrypting the plaintext three times. - IDEA (International Data Encryption Standard) - blowfish encryption algorithm, which is said to be faster than DES and IDEA Security and confidence are the key-words for a popular key-system: As DES and its successors have been used for so many years and by many people without having been broken, they are considered safe - safer than others, not used that frequently, no matter whether they are actually safer or not. For further information see: |
|
Optical communication system by Aeneas Tacitus, 4th century B.C. Aeneas Tacitus, a Greek military scientist and cryptographer, invented an optical communication system that combines water and beacon telegraphy. Torches indicated the beginnings and the ends of message transmissions while water jars were used to transmit the messages. These jars had a plugged standard-size hole drilled on the bottom side and were filled with water. As those who sent and those who received the message unplugged the jars simultaneously, the water drained out. Because the transmitted messages corresponded to water levels, the sender indicated by torch signal that the appropriate water level has been reached. It is a disadvantage that the possible messages are restricted to a given code, but as this system was mainly used for military purposes, this was offset by the advantage that it was almost impossible for outsiders to understand these messages unless they possessed the codebook. With communication separated from transportation, the distant became near. Tacitus' telegraph system was very fast and not excelled until For further information see Joanne Chang & Anna Soellner, Decoding Device, |
|
Gutenberg's printing press, 1455 Gutenberg's printing press, an innovative aggregation of inventions known for centuries before Gutenberg: the olive oil press, oil-based ink, block-print technology, and movable types, allowed the mass production of the movable type used to reproduce a page of text and increased the production rate enormously. During the Middle Ages monks took at least a year over making a handwriting copy of a book. Gutenberg printed about 300 sheets per day. Because parchment was too costly for mass production - often for the production of one copy of a medieval book a whole flock of sheep was used - it was substituted by cheap paper made from recycled clothing left over from the massive number of dead caused by the Great Plague. Within forty-five years, in 1500, already ten million copies were available for a few hundred thousand literate. Because individuals could examine a range of opinions now, the printed Bible, especially after having been translated into German by Martin Luther, and increasing literacy added to the subversion of clerical authorities. The interest in books increased with the rise of vernacular, non-Latin literary texts, beginning with Dante's Divine Comedy, the first literary text written in Italian. Among others, the improvement of the distribution and the production of books and increased literacy made the development of print mass media possible. Michael Giesecke (Sinnenwandel Sprachwandel Kulturwandel. Studien zur Vorgeschichte der Informationsgesellschaft, Frankfurt am Main: Suhrkamp, 1992) has shown that due to a division of labor among authors, printers and typesetters Gutenberg's invention increasingly led to a standardization of - written and unwritten - language in form of orthography, grammar and signs. To communicate one's ideas became linked to the use of a kind of code, and reading became a kind of rite of passage, in every human's life an important step towards independency. With the increasing linkage of knowledge to wide reading and learnedness, the history of knowledge becomes the history of readings, of readings dependent on chance and on circumstance. For further details see: Martin Warnke, Text und Technik, Bruce Jones, Manuscripts, Books, and Maps: The Printing Press and a Changing World, |
|
Bertelsmann The firm began in Germany in 1835, when Carl Bertelsmann founded a religious print shop and publishing establishment in the Westphalian town of Gütersloh. The house remained family-owned and grew steadily for the next century, gradually adding literature, popular fiction, and theology to its title list. Bertelsmann was shut down by the Nazis in 1943, and its physical plant was virtually destroyed by Allied bombing in 1945. The quick growth of the Bertelsmann empire after World War II was fueled by the establishment of global networks of book clubs (from 1950) and music circles (1958). By 1998 Bertelsmann AG comprised more than 300 companies concentrated on various aspects of media. During fiscal year 1997-98, Bertelsmann earned more than US$15 billion in revenue and employed 58.000 people, of whom 24.000 worked in Germany. |
|
Medieval universities and copying of books The first of the great medieval universities was established at Bologna. At the beginning, universities predominantly offered a kind of do-it-yourself publishing service. Books still had to be copied by hand and were so rare that a copy of a widely desired book qualified for being invited to a university. Holding a lecture equaled to reading a book aloud, like a priest read from the Bible during services. Attending a lecture equaled to copy a lecture word by word, so you had your own copy of a book, thus enabling you to hold a lecture, too. For further details see History of the Idea of a University, |
|