Timeline 1970-2000 AD

1971 IBM's work on the Lucifer cipher and the work of the NSA lead to the U.S. Data Encryption Standard (= DES)

1976 Whitfield Diffie and Martin Hellman publish their book New Directions in Cryptography, playing with the idea of public key cryptography

1977/78 the RSA algorithm is developed by Ron Rivest, Adi Shamir and Leonard M. Adleman and is published

1984 Congress passes Comprehensive Crime Control Act

- The Hacker Quarterly is founded

1986 Computer Fraud and Abuse Act is passed in the USA

- Electronic Communications Privacy Act

1987 Chicago prosecutors found Computer Fraud and Abuse Task Force

1988 U.S. Secret Service covertly videotapes a hacker convention

1989 NuPrometheus League distributes Apple Computer software

1990 - IDEA, using a 128-bit key, is supposed to replace DES

- Charles H. Bennett and Gilles Brassard publish their work on Quantum Cryptography

- Martin Luther King Day Crash strikes AT&T long-distance network nationwide


1991 PGP (= Pretty Good Privacy) is released as freeware on the Internet, soon becoming worldwide state of the art; its creator is Phil Zimmermann

- one of the first conferences for Computers, Freedom and Privacy takes place in San Francisco

- AT&T phone crash; New York City and various airports get affected

1993 the U.S. government announces to introduce the Clipper Chip, an idea that provokes many political discussions during the following years

1994 Ron Rivest releases another algorithm, the RC5, on the Internet

- the blowfish encryption algorithm, a 64-bit block cipher with a key-length up to 448 bits, is designed by Bruce Schneier

1990s work on quantum computer and quantum cryptography

- work on biometrics for authentication (finger prints, the iris, smells, etc.)

1996 France liberates its cryptography law: one now can use cryptography if registered

- OECD issues Cryptography Policy Guidelines; a paper calling for encryption exports-standards and unrestricted access to encryption products

1997 April European Commission issues Electronic Commerce Initiative, in favor of strong encryption

1997 June PGP 5.0 Freeware widely available for non-commercial use

1997 June 56-bit DES code cracked by a network of 14,000 computers

1997 August U.S. judge assesses encryption export regulations as violation of the First Amendment

1998 February foundation of Americans for Computer Privacy, a broad coalition in opposition to the U.S. cryptography policy

1998 March PGP announces plans to sell encryption products outside the USA

1998 April NSA issues a report about the risks of key recovery systems

1998 July DES code cracked in 56 hours by researchers in Silicon Valley

1998 October Finnish government agrees to unrestricted export of strong encryption

1999 January RSA Data Security, establishes worldwide distribution of encryption product outside the USA

- National Institute of Standards and Technologies announces that 56-bit DES is not safe compared to Triple DES

- 56-bit DES code is cracked in 22 hours and 15 minutes

1999 May 27 United Kingdom speaks out against key recovery

1999 Sept: the USA announce to stop the restriction of cryptography-exports

2000 as the German government wants to elaborate a cryptography-law, different organizations start a campaign against that law

- computer hackers do no longer only visit websites and change little details there but cause breakdowns of entire systems, producing big economic losses

for further information about the history of cryptography see:
http://www.clark.net/pub/cme/html/timeline.html
http://www.math.nmsu.edu/~crypto/Timeline.html
http://fly.hiwaay.net/~paul/cryptology/history.html
http://www.achiever.com/freehmpg/cryptology/hocryp.html
http://all.net/books/ip/Chap2-1.html
http://cryptome.org/ukpk-alt.htm
http://www.iwm.org.uk/online/enigma/eni-intro.htm
http://www.achiever.com/freehmpg/cryptology/cryptofr.html
http://www.cdt.org/crypto/milestones.shtml

for information about hacker's history see:
http://www.farcaster.com/sterling/chronology.htm:

TEXTBLOCK 1/9 // URL: http://world-information.org/wio/infostructure/100437611776/100438658960
 
1400 - 1500 A.D.

1455
Johannes Gutenberg publishes the Bible as the first book in Europe by means of a movable metal font.

Gutenberg's printing press was an innovative aggregation of inventions known for centuries before Gutenberg: the olive oil press, oil-based ink, block-print technology, and movable types allowed the mass production of the movable type used to reproduce a page of text and enormously increased the production rate. During the Middle Ages it took monks at least a year to make a handwritten copy of a book. Gutenberg could print about 300 sheets per day. Because parchment was too costly for mass production - for the production of one copy of a medieval book often a whole flock of sheep was used - it was substituted by cheap paper made from recycled clothing of the massive number of deads caused by the Great Plague.

Within forty-five years, in 1500, ten million copies were available for a few hundred thousand literate people. Because individuals could examine a range of opinions now, the printed Bible - especially after having been translated into German by Martin Luther - and increasing literacy added to the subversion of clerical authorities. The interest in books grew with the rise of vernacular, non-Latin literary texts, beginning with Dante's Divine Comedy, the first literary text written in Italian.

Among others the improvement of the distribution and production of books as well as increased literacy made the development of print mass media possible.

Michael Giesecke (Sinnenwandel Sprachwandel Kulturwandel. Studien zur Vorgeschichte der Informationsgesellschaft, Frankfurt am Main: Suhrkamp, 1992) has shown that due to a division of labor among authors, printers and typesetters Gutenberg's invention increasingly led to a standardization of - written and unwritten - language in form of orthography, grammar and signs. To communicate one's ideas became linked to the use of a code, and reading became a kind of rite of passage, an important step towards independency in a human's life.

With the growing linkage of knowledge to reading and learning, the history of knowledge becomes the history of reading, of reading dependent on chance and circumstance.

For further details see:
Martin Warnke, Text und Technik, http://www.uni-lueneburg.de/
Bruce Jones, Manuscripts, Books, and Maps: The Printing Press and a Changing World, http://communication.ucsd.edu/bjones/Books/booktext.html

TEXTBLOCK 2/9 // URL: http://world-information.org/wio/infostructure/100437611796/100438659777
 
Convergence

TEXTBLOCK 3/9 // URL: http://world-information.org/wio/infostructure/100437611795/100438659138
 
Governmental Influence

Agencies like the NSA are currently able to eavesdrop on anyone with few restrictions only - though other messages are spread by the NSA.
Theoretically cryptography can make that difficult. Hence those agencies speak up for actions like introducing trapdoors to make it possible to get access to everybody's data.

See the U.S. discussion about the Clipper Chip some years ago:
http://www.epic.org/crypto/clipper/
http://www.cdt.org/crypto/admin/041693whpress.txt

While encryption offers us privacy for the transmission of data, we do not only wish to have it but also need it if we want to transport data which shall not be seen by anyone else but the recipient of our message. Given this, the governments and governmental institutions/organizations fear to lose control. Strict laws are the consequence. The often repeated rumor that the Internet was a sphere of illegality has been proven wrong. Some parts are controlled by law very clearly. One of them is cryptography. Prohibition of cryptography or at least its restriction are considered an appropriate tool against criminality. Or one should say: had been considered that. In the meantime also governmental institutions have to admit that those restrictions most of all work against the population instead against illegal actors. Therefore laws have been changed in many states during the last five years. Even the USA, the Master of cryptography-restriction, liberated its laws in December 1999 to be more open-minded now.

for an insight into the discussion having gone on for years see:
http://www.cdt.org/crypto/new2crypto/3.shtml

the final text of the new U.S. Encryption Regulations you will find under:
http://www.cdt.org/crypto/admin/000110cryptoregs.shtml
http://www.cdt.org/crypto/admin/000114cryptoregs.txt

an explanation of the regulations can be found under:
http://www.cdt.org/crypto/admin/000112commercefactsheet.shtml

TEXTBLOCK 4/9 // URL: http://world-information.org/wio/infostructure/100437611776/100438659102
 
History: Communist Tradition

Following the communist revolutions of the 20th century all "means of production" became the property of the state as representative of "the masses". Private property ceased to exist. While moral rights of the creator were recognized and economic rights acknowledged with a one-time cash award, all subsequent rights reverted to the state.

With the transformation of many communist countries to a market system most of them have now introduced laws establishing markets in intellectual property rights. Still the high rate of piracy reflects a certain lack of legal tradition.

TEXTBLOCK 5/9 // URL: http://world-information.org/wio/infostructure/100437611725/100438659483
 
1700 - 1800 A.D.

1713
First typewriter patent filed

In 1714 Henry Mill got granted a patent for his idea of an "artificial machine or method" for forgery-proof writing. Still it was not before 1808 that the first typewriter proven to have worked was built by Pellegrino Turri for his visually impaired friend, the Countess Carolina Fantoni da Fivizzono. The commercial production of typewriters began in 1873.

For a brief history of typewriters see Richard Polt, The Classic Typewriter Page, http://xavier.xu.edu/~polt/typewriters.html

1727
First photocopies

Searching for the Balduinist fluorescenting phosphor (Balduinischer Leuchtphosphor), an artificial fluorescent, Johann Heinrich Schulze realized the first photocopies, but did not put them into practical use.

The first optical photocopier was not patented before 1843, when William Henry Fox Talbot got granted a patent for his magnifying apparatus.

In 1847 Frederick Collier Bakewell developed a procedure for telecopying, a forerunner of the fax machine. Yet it was not before 1902 that images could be transmitted. Almost 200 years after Schulze's discovery, for the first time photo telegraphy was offered as a telecommunication service in Germany in 1922.

1794
Fixed optical network between Paris and Lille

Claude Chappe built a fixed optical network between Paris and Lille. Covering a distance of about 240kms, it consisted of fifteen towers with semaphores.
Because the communication system was designed for practical military use, the transmitted messages were encoded. The messages were kept such a secret that even those who transmit them from tower to tower did not capture their meaning; they transmitted codes they did not understand. Depending on weather conditions, messages could be sent at a speed of 2880 kms/hr at best.

Forerunners of Chappe's optical network are the Roman smoke signals network and Aeneas Tacitus' optical communication system.

For more information on early communication networks see Gerard J. Holzmann and Bjoern Pehrson, The Early History of Data Networks.

TEXTBLOCK 6/9 // URL: http://world-information.org/wio/infostructure/100437611796/100438659771
 
Epilogue

As scientists are working hard on a quantum computer and also on quantum cryptography one can imagine that another revolution in the study of encryption has to be expected within the next years. By then today's hardware and software tools will look extraordinary dull. At the moment it is impossible to foresee the effects on cryptography and democratic developments by those means; the best and the worst can be expected at the same time. A certain ration of pessimism and prosecution mania are probably the right mixture of emotions about those tendencies, as the idea of big brother has come into existence long ago.

At the same time it will - in part - be a decision of the people to let science work against them or not. Acceleration of data-transmission calls for an acceleration of encryption-methods. And this again falls back on us, on an acceleration of daily life, blurring the private and the public for another time.
We live in an intersection, job and private life growing together. Cryptography cannot help us in that case. The privacy in our mind, the virtuality of all private and public lies in the field of democracy, or at least what is - by connection to the Human Rights - regarded as democracy.

TEXTBLOCK 7/9 // URL: http://world-information.org/wio/infostructure/100437611776/100438658875
 
So what does cryptography mean?

cryptography:
It is the study of encryption, the art/science to create and use codes and/or ciphers with the purpose of enciphering as well as deciphering.
After a relatively vivid but slow development of cryptography for nearly 4.000 years the inventions of the telegraph, radio and computer had a high impact on the velocity of further inventions concerning encryption.
Most of the time economic, political or military reasons lie behind the necessity of encryption. As visible from the timetable cryptography it is also done for private and individual interests. An extraordinary example for this is the Braille Code, developed as a possibility for blind people to read and write.
A lot of very interesting and intelligent websites about cryptography can be found in the Internet.Some websites offering links to various cryptography-websites are:
http://www.ciia.org/links.htm
http://www.isse.gmu.edu/~njohnson/Security/stegres.htm
http://www.hack.gr/users/dij/crypto/links.html
http://www.achiever.com/freehmpg/cryptology/lessons.html
http://www.iks-jena.de/mitarb/lutz/security/links.html
http://world.std.com/~franl/crypto/
http://home.tu-clausthal.de/~inas/Links.html
http://theory.lcs.mit.edu/~rivest/crypto-security.html
http://www.britannica.com/bcom/eb/article/xref/0,5716,5453,00.html
http://www-personal.umich.edu/~rak/web_sites.html

Further there exists a wide range of web-magazines/newsletters/mailing lists on cryptography, e.g.:
Crypto-Gram Newsletter: http://www.counterpane.com/crypto-gram.html
Journal of Computer Security: http://www.gocsi.com/m_form.htm
Cypherpunks: http://www.inet-one.com/cypherpunks/
Stegano-L: http://www.thur.de/ulf/stegano/sub.html
ZD Internet Magazine: http://www.zdnet.com/

TEXTBLOCK 8/9 // URL: http://world-information.org/wio/infostructure/100437611776/100438659057
 
Commercial vs. Independent Content: Human and Financial Resources

- Concerning their human and financial resources commercial media and independent content provider are an extremely unequal pair. While the 1998 revenues of the world's leading media conglomerates (AOL Time Warner, Disney, Bertelsmann, Viacom and the News Corporation) amounted to US$ 91,144,000,000 provider of independent content usually act on a non-profit basis and to a considerable extent depend on donations and contributions.

Also the human resources they have at their disposal quite differ. Viacom for example employs 112,000 people. Alternative media conversely are mostly run by a small group of activists, most of them volunteers. Moreover the majority of the commercial media giants has a multitude of subsidiaries (Bertelsmann for instance has operations in 53 countries), while independent content provider in some cases do not even have proper office spaces. Asked about their offices number of square meters Frank Guerrero from RTMark comments "We have no square meters at all, because we are only on the web. I guess if you add up all of our servers and computers we would take up about one or two square meters."

TEXTBLOCK 9/9 // URL: http://world-information.org/wio/infostructure/100437611795/100438659146
 
Intellectual property

Intellectual property, very generally, relates to the output that result from intellectual activity in the industrial, scientific, literary and artistic fields. Traditionally intellectual property is divided into two branches: 1) industrial property (inventions, marks, industrial designs, unfair competition and geographical indications), and 2) copyright. The protection of intellectual property is guaranteed through a variety of laws, which grant the creators of intellectual goods, and services certain time-limited rights to control the use made of their products.

INDEXCARD, 1/13
 
Time Warner

The largest media and entertainment conglomerate in the world. The corporation resulted from the merger of the publisher Time Inc. and the media conglomerate Warner Communications Inc. in 1989. It acquired the Turner Broadcasting System, Inc. (TBS) in 1996. Time Warner Inc.'s products encompass magazines, hardcover books, comic books, recorded music, motion pictures, and broadcast and cable television programming and distribution. The company's headquarters are in New York City. In January 2000 Time Warner merged with AOL (America Online), which owns several online-services like Compuserve, Netscape and Netcenter in a US$ 243,3 billion deal.

INDEXCARD, 2/13
 
Java Applets

Java applets are small programs that can be sent along with a Web page to a user. Java applets can perform interactive animations, immediate calculations, or other simple tasks without having to send a user request back to the server. They are written in Java, a platform-independent computer language, which was invented by Sun Microsystems, Inc.

Source: Whatis.com

INDEXCARD, 3/13
 
Neighboring rights

Copyright laws generally provide for three kinds of neighboring rights: 1) the rights of performing artists in their performances, 2) the rights of producers of phonograms in their phonograms, and 3) the rights of broadcasting organizations in their radio and television programs. Neighboring rights attempt to protect those who assist intellectual creators to communicate their message and to disseminate their works to the public at large.

INDEXCARD, 4/13
 
Satellites

Communications satellites are relay stations for radio signals and provide reliable and distance-independent high-speed connections even at remote locations without high-bandwidth infrastructure.

On point-to-point transmission, the transmission method originally employed on, satellites face increasing competition from fiber optic cables, so point-to-multipoint transmission increasingly becomes the ruling satellite technology. Point-to-multipoint transmission enables the quick implementation of private networks consisting of very small aperture terminals (VSAT). Such networks are independent and make mobile access possible.

In the future, satellites will become stronger, cheaper and their orbits will be lower; their services might become as common as satellite TV is today.

For more information about satellites, see How Satellites Work (http://octopus.gma.org/surfing/satellites) and the Tech Museum's satellite site (http://www.thetech.org/hyper/satellite).

http://www.whatis.com/vsat.htm
http://octopus.gma.org/surfing/satellites
INDEXCARD, 5/13
 
cryptology

also called "the study of code". It includes both, cryptography and cryptoanalysis

INDEXCARD, 6/13
 
George Boole

b. Nov. 2, 1815, Lincoln, Lincolnshire, England
d. Dec. 8, 1864, Ballintemple, County Cork, Ireland

English mathematician who helped establish modern symbolic logic and whose algebra of logic, now called Boolean algebra, is basic to the design of digital computer circuits. One of the first Englishmen to write on logic, Boole pointed out the analogy between the algebraic symbols and those that can represent logical forms and syllogisms, showing how the symbols of quantity can be separated from those of operation. With Boole in 1847 and 1854 began the algebra of logic, or what is now called Boolean algebra. It is basically two-valued in that it involves a subdivision of objects into separate classes, each with a given property. Different classes can then be treated as to the presence or absence of the same property.


INDEXCARD, 7/13
 
Ron Rivest

Ronald L. Rivest is Webster Professor of Electrical Engineering and Computer Science in MIT's EECS Department. He was one of three persons in a team to invent the RSA public-key cryptosystem. The co-authors were Adi Shamir and Leonard M. Adleman.

INDEXCARD, 8/13
 
Artificial Intelligence

Artificial Intelligence is concerned with the simulation of human thinking and emotions in information technology. AI develops "intelligent systems" capable, for example, of learning and logical deduction. AI systems are used for creatively handling large amounts of data (as in data mining), as well as in natural speech processing and image recognition. AI is also used as to support decision taking in highly complex environments.
Yahoo AI sites: http://dir.yahoo.com/Science/Computer_Science/Artificial_Intelligence/
MIT AI lab: http://www.ai.mit.edu/


http://dir.yahoo.com/Science/Computer_Science...
http://www.ai.mit.edu/
INDEXCARD, 9/13
 
DES

The U.S. Data Encryption Standard (= DES) is the most widely used encryption algorithm, especially used for protection of financial transactions. It was developed by IBM in 1971. It is a symmetric-key cryptosystem. The DES algorithm uses a 56-bit encryption key, meaning that there are 72,057,594,037,927,936 possible keys.

for more information see:
http://www.britannica.com/bcom/eb/article/3/0,5716,117763+5,00.html
http://www.cryptography.com/des/

http://www.britannica.com/bcom/eb/article/3/0...
http://www.cryptography.com/des/
INDEXCARD, 10/13
 
WIPO

The World Intellectual Property Organization is one of the specialized agencies of the United Nations (UN), which was designed to promote the worldwide protection of both industrial property (inventions, trademarks, and designs) and copyrighted materials (literary, musical, photographic, and other artistic works). It was established by a convention signed in Stockholm in 1967 and came into force in 1970. The aims of WIPO are threefold. Through international cooperation, WIPO promotes the protection of intellectual property. Secondly, the organization supervises administrative cooperation between the Paris, Berne, and other intellectual unions regarding agreements on trademarks, patents, and the protection of artistic and literary work and thirdly through its registration activities the WIPO provides direct services to applicants for, or owners of, industrial property rights.

INDEXCARD, 11/13
 
The World Wide Web History Project

The ongoing World Wide Web History Project was established to record and publish the history of the World Wide Web and its roots in hypermedia and networking. As primary research methods are used archival research and the analysis of interviews and talks with pioneers of the World Wide Web. As result a vast of collection of historic video, audio, documents, and software is expected. The project's digital archive is currently under development.

http://www.webhistory.org/home.html

INDEXCARD, 12/13
 
MIT

The MIT (Massachusetts Institute of Technology) is a privately controlled coeducational institution of higher learning famous for its scientific and technological training and research. It was chartered by the state of Massachusetts in 1861 and became a land-grant college in 1863. During the 1930s and 1940s the institute evolved from a well-regarded technical school into an internationally known center for scientific and technical research. In the days of the Great Depression, its faculty established prominent research centers in a number of fields, most notably analog computing (led by Vannevar Bush) and aeronautics (led by Charles Stark Draper). During World War II, MIT administered the Radiation Laboratory, which became the nation's leading center for radar research and development, as well as other military laboratories. After the war, MIT continued to maintain strong ties with military and corporate patrons, who supported basic and applied research in the physical sciences, computing, aerospace, and engineering. MIT has numerous research centers and laboratories. Among its facilities are a nuclear reactor, a computation center, geophysical and astrophysical observatories, a linear accelerator, a space research center, supersonic wind tunnels, an artificial intelligence laboratory, a center for cognitive science, and an international studies center. MIT's library system is extensive and includes a number of specialized libraries; there are also several museums.

INDEXCARD, 13/13