some essential definitions

some essential definitions in the field of cryptography are:
- cryptoanalysis
- cryptology
- ciphers

"Few false ideas have more firmly gripped the minds of so many intelligent men than the one that, if they just tried, they could invent a cipher that no one could break." (David Kahn)

codes
plaintext
ciphertext
to encipher/encode
to decipher/decode

The variants of encryption systems are endless.
For deciphering there exists always the same game of trial and error (first guessing the encryption method, then the code). A help to do so is pruning. Once, after a more or less long or short period a code/cipher breaks. Monoalphabetic ciphers can be broken easily and of course are no longer used today but for games.

for further information on codes and ciphers etc. see:
http://www.optonline.com/comptons/ceo/01004A.html
http://www.ridex.co.uk/cryptology/#_Toc439908851

TEXTBLOCK 1/5 // URL: http://world-information.org/wio/infostructure/100437611776/100438659070
 
Content Choice and Selective Reporting

Media as today's main information sources unarguably have the power to influence political agenda-setting and public opinion. They decide which topics and issues are covered and how they are reported. Still, in many cases those decisions are not primarily determined by journalistic criteria, but affected by external factors. The importance of shareholders forces media to generate more profit every quarter, which can chiefly be raised by enlarging audiences and hence attracting more advertising money. Therefore the focus of media's programming in many cases shifts towards audience alluring content like entertainment, talk-shows, music and sports.

Further pressure regarding the selection of content occurs from advertisers and marketers, who often implicitly or explicitly suggest to refrain from programming which could show them or their products and services (e.g. tobacco) in an unfavorable light. Interlocking directorships and outright ownerships can moreover be responsible for a selective coverage. Financial connections with defense, banking, insurance, gas, oil, and nuclear power, repeatedly lead (commercial) media to the withholding of information, which could offend their corporate partners. In totalitarian regimes also pressure from political elites may be a reason for the suppression or alteration of certain facts.

TEXTBLOCK 2/5 // URL: http://world-information.org/wio/infostructure/100437611734/100438658492
 
Timeline 1600 - 1900 AD

17th century Cardinal Richelieu invents an encryption-tool called grille, a card with holes for writing messages on paper into the holes of those cards. Afterwards he removes the cards and fills in the blanks, so the message looks like an ordinary letter. The recipient needs to own the same card

- Bishop John Wilkins invents a cryptologic system looking like music notes. In a book he describes several forms of steganographic systems like secrets inks, but also the string cipher. He mentions the so-called Pig Latin, a spoken way of encryption that was already used by the ancient Indians

- the English scientist, magician and astrologer John Dee works on the ancient Enochian alphabet; he also possesses an encrypted writing that could not been broken until today

1605/1623 Sir Francis Bacon (= Francis Tudor = William Shakespeare?) writes several works containing ideas about cryptography. One of his most important advises is to use ciphers in such a way that no-one gets suspicious that the text could be enciphered. For this the steganogram was the best method, very often used in poems. The attempt to decipher Shakespeare's sonnets (in the 20th century) lead to the idea that his works had been written by Francis Bacon originally.

1671 Leibniz invents a calculating machine that uses the binary scale which we still use today, more advanced of course, called the ASCII code

18th century this is the time of the Black Chambers of espionage in Europe, Vienna having one of the most effective ones, called the "Geheime Kabinettskanzlei", headed by Baron Ignaz von Koch. Its task is to read through international diplomatic mail, copy letters and return them to the post-office the same morning. Supposedly about 100 letters are dealt with each day.

1790's Thomas Jefferson and Robert Patterson invent a wheel cipher

1799 the Rosetta Stone is found and makes it possible to decipher the Egyptian Hieroglyphs

1832 or 1838 Sam Morse develops the Morse Code, which actually is no code but an enciphered alphabet of short and long sounds. The first Morse code-message is sent by telegraph in 1844.

1834 the Braille Code for blind people is developed in today's form by Louis Braille

1844 the invention of the telegraph changes cryptography very much, as codes are absolutely necessary by then

1854 the Playfair cipher is invented by Sir Charles Wheatstone

1859 for the first time a tomographic cipher gets described

1861 Friedrich W. Kasiski does a cryptoanalysis of the Vigenère ciphers, which had been supposed to be uncrackable for ages

1891 Major Etienne Bazeries creates a new version of the wheel cipher, which is rejected by the French Army

1895 the invention of the radio changes cryptography-tasks again and makes them even more important

TEXTBLOCK 3/5 // URL: http://world-information.org/wio/infostructure/100437611776/100438658974
 
Selection of Independent Content Provider

The following selection does not claim to present an exhaustive listing, but rather picks some of the most interesting provider of independent content.

Independent Content Provider

URL

Classification of Content

Association for Progressive Communication (APC)

http://www.apc.org

Social issues, environment, economy, Africa, women

ZaMir.net

http://www.zamir.net

Anti-war, human rights (Yugoslavia)

Institute for Global Communications (IGC)

http://www.igc.org

Peace, economy, human rights, democracy, environment, women, anti-racism

FAIR (Fairness & Accuracy In Reporting)

http://www.fair.org

Media

ZNet

http://www.zmag.org

Selection: culture, community/race/religion/ethnicity, ecology, economics/class, gender/kinship/sexuality, government/polity, international relations

B2-92

http://www.freeb92.net

Politics

FREEnet (The Network for Research, Education and Engineering)

http://www.free.net

Research/academic/education

c2o (Community Communications Online)

http://www.c20.org

Environment, social issues, human rights

Antenna

http://antenna.apc.org

Development co-operation/emergency aid, environment, ecology, energy, media, art, culture

PERDCA (The Project for Economic Reform and Development in Central Asia)

http://www.silk.org

Telecommunications, education, medicine

Comlink

http://www.comlink.org

Peace, ecology, social issues, human rights

Adbusters

http://www.adbusters.org

Culture, art

RTMark

http://www.rtmark.com

Culture, art

Interdoc

http://www.oneworld.org/interdoc/

Labor, human rights, development, environment, peace

GreenNet

http://www.gn.apc.org

Environment, peace, human rights, development

UN (United Nations)

http://www.un.org

Peace, economy, social issues, development, justice, human rights, international law, humanitarian assistance and various specialized agencies

Flipside

http://www.flipside.org

Economic, political, social, environmental

Human Rights Watch

http://www.hrw.org

Human rights

nettime

http://www.nettime.org

Culture

FoeBud e.V. (Verein zur Förderung des öffentlichen bewegten und unbewegten Datenverkehrs e.V.)

http://www.foebud.org

Research, politics, culture, arts, future/technology

Corporate Watch

http://www.corpwatch.org

Social issues, politics, economy, environment

Overcoming Consumerism

http://www.hooked.net/users/verdant/index.htm

Social issues, economy, environment

NewsWatch

http://www.asc.upenn.edu/usr/jsexton/NewsWatch/

Media

IFEX (International Freedom of Expression Exchange)

http://www.ifex.org

Media, human rights

FAS (Federation of American Scientists)

http://www.fas.org

Science, technology, public policy

UNESCO (United Nations Educational, Scientific and Cultural Organization)

http://www.unesco.org

Education, science, culture, communication

Umwelt

http://www.umwelt.org

Environment



TEXTBLOCK 4/5 // URL: http://world-information.org/wio/infostructure/100437611734/100438659267
 
Governmental Regulations

The new U.S. regulations are based on the Wassenaar Arrangement Revision of 1998, where exports without license of 56 bit DES and similar products are allowed after a technical review, just like encryption commodities and software with key lengths of 64-bits or less which meet the mass market requirements.
For more information see:
http://www.wassenaar.org/

Seven states stay excluded from the new freedom. These are states like Libya, Iraq, Iran, North Korea and Cuba, altogether states seen as terrorist supporting. No encryption tools may be exported into those countries.

This is, what happened in the USA, whereas in Germany the issue of a cryptography-law is still on the agenda. Until now, in Germany, everyone can decide by her-/himself, whether she/he wants to encrypt electronic messages or not. Some organizations fear that this could get changed soon. Therefore an urgent action was organized in February 2000 to demonstrate the government that people want the freedom to decide on their own. One governmental argument is that only very few people actually use cryptography. Therefore the urgent action is organized as a campaign for using it more frequently.

For more information on this see:
http://www.heise.de/ct/97/04/032/
http://www.fitug.de/ulf/krypto/verbot.html#welt

Other European countries have more liberate laws on cryptography, like France. Austria doesn't have any restrictions at all, probably because of a governmental lack of interest more than accepting freedom.
The (former) restrictions in the bigger countries influenced and hindered developments for safer key-systems, e.g. the key-length was held down extraordinarily.

"Due to the suspicious nature of crypto users I have a feeling DES will be with us forever, we will just keep adding keys and cycles (...). There is a parallel between designing electronic commerce infrastructure today that uses weak cryptography (i.e. 40 or 56 bit keys) and, say, designing air traffic control systems in the '60s using two digit year fields. (...) Just because you can retire before it all blows up doesn't make it any less irresponsible."
(Arnold G. Reinhold)


The Chinese State Encryption Management Commission (SEMC) announced in March 2000 that only strong encryption tools will have to be registered in the future. Which sounds so nice on first sight, does not mean a lot in reality: any kind of useful encryption technique, like the PGP, stay under governmental control.

The restrictions and prohibitions for cryptography are part of the states' wish to acquire more control - in the name of the battle against criminality, probably?
Due to the emerging organized criminality the governments want to obtain more freedom of control over citizens. Organizations like the NSA appear as the leaders of such demands.
What about civil rights or Human Rights?

TEXTBLOCK 5/5 // URL: http://world-information.org/wio/infostructure/100437611776/100438659135
 
Sony Corporation

Japanese SONY KK, major Japanese manufacturer of consumer electronics products. Headquarters are in Tokyo. The company was incorporated in 1946 and spearheaded Japan's drive to become the world's dominant consumer electronics manufacturer in the late 20th century. The company was one of the first to recognize the potential of the consumer videotape market. In 1972 it formed an affiliate to market its Betamax colour videocassette system. In 1987-88 Sony purchased the CBS Records Group from CBS Inc., thus acquiring the world's largest record company. It followed that purchase with the purchase in 1989 of Columbia Pictures Entertainment Inc.

INDEXCARD, 1/3
 
atbash

Atbash is regarded as the simplest way of encryption. It is nothing else than a reverse-alphabet. a=z, b= y, c=x and so on. Many different nations used it in the early times of writing.

for further explanations see:
http://www.ftech.net/~monark/crypto/crypt/atbash.htm

http://www.ftech.net/~monark/crypto/crypt/atb...
INDEXCARD, 2/3
 
Samuel Thomas Soemmering's electric telegraph, 1809

With Samuel Thomas Soemmering's invention of the electrical telegraph the telegraphic transmission of messages is no longer tied to visibility, as it is the case with smoke and light signals networks. Economical and reliable, the electric telegraph became the state-of-the-art communication system for fast data transmissions, even over long distances.

Click here for an image of Soemmering's electric telegraph.

http://www.heise.de/tp/deutsch/inhalt/co/2335...
INDEXCARD, 3/3