Timeline of Communication Systems: Introduction

The timeline of communication systems presents a chronological overview of the most important events in the history of communication systems from the 4th millennium B.C. to the present.

It shows that from the very beginning - the first Sumerian pictographs on clay tablets to today's state-of-the-art technologies - broadband communication via fiber-optic cables and satellites - the amount of information collected, processed and stored, the capabilities to do so, as well as the capable speed of information transmission exponentially accelerate.

TEXTBLOCK 1/7 // URL: http://world-information.org/wio/infostructure/100437611796/100438659793
 
Digital Signatures, Timestamps etc

Most computer systems are far from being secure.
A lack of security - it is said - might hinder the developments of new information technologies. Everybody knows electronic transactions involve a more or less calculated risk. Rumors about insecurity let consumers doubt whether the commodity of e-commerce is bigger or its risks. First of all the market depends on the consumer's confidence. To provide that another application for public key cryptography gets essential: the digital signature, which is used to verify the authenticity of the sender of certain data.
It is done with a special private key, and the public key is verifying the signature. This is especially important if the involved parties do not know one another. The DSA (= Digital Signature Algorithm) is a public-key system which is only able to sign digitally, not to encrypt messages. In fact digital signature is the main-tool of cryptography in the private sector.

Digital signatures need to be given for safe electronic payment. It is a way to protect the confidentiality of the sent data, which of course could be provided by other ways of cryptography as well. Other security methods in this respect are still in development, like digital money (similar to credit cards or checks) or digital cash, a system that wants to be anonymous like cash, an idea not favored by governments as it provides many opportunities for money laundry and illegal transactions.

If intellectual property needs to be protected, a digital signature, together with a digital timestamp is regarded as an efficient tool.

In this context, the difference between identification and authentication is essential. In this context smartcards and firewalls are relevant, too.

A lot of digital transactions demand for passwords. More reliable for authentication are biometric identifiers, full of individual and unrepeatable codes, signatures that can hardly be forged.

For more terms of cryptography and more information see:
http://poseidon.csd.auth.gr/signatures
http://www.dlib.org/dlib/december97/ibm/12lotspiech.html
http://www.cryptography.com/technology/technology.html
http://www.cdt.org/crypto/glossary.shtml
http://www.oecd.org//dsti/sti/it/secur/prod/GD97-204.htm

TEXTBLOCK 2/7 // URL: http://world-information.org/wio/infostructure/100437611776/100438659015
 
Timeline 1970-2000 AD

1971 IBM's work on the Lucifer cipher and the work of the NSA lead to the U.S. Data Encryption Standard (= DES)

1976 Whitfield Diffie and Martin Hellman publish their book New Directions in Cryptography, playing with the idea of public key cryptography

1977/78 the RSA algorithm is developed by Ron Rivest, Adi Shamir and Leonard M. Adleman and is published

1984 Congress passes Comprehensive Crime Control Act

- The Hacker Quarterly is founded

1986 Computer Fraud and Abuse Act is passed in the USA

- Electronic Communications Privacy Act

1987 Chicago prosecutors found Computer Fraud and Abuse Task Force

1988 U.S. Secret Service covertly videotapes a hacker convention

1989 NuPrometheus League distributes Apple Computer software

1990 - IDEA, using a 128-bit key, is supposed to replace DES

- Charles H. Bennett and Gilles Brassard publish their work on Quantum Cryptography

- Martin Luther King Day Crash strikes AT&T long-distance network nationwide


1991 PGP (= Pretty Good Privacy) is released as freeware on the Internet, soon becoming worldwide state of the art; its creator is Phil Zimmermann

- one of the first conferences for Computers, Freedom and Privacy takes place in San Francisco

- AT&T phone crash; New York City and various airports get affected

1993 the U.S. government announces to introduce the Clipper Chip, an idea that provokes many political discussions during the following years

1994 Ron Rivest releases another algorithm, the RC5, on the Internet

- the blowfish encryption algorithm, a 64-bit block cipher with a key-length up to 448 bits, is designed by Bruce Schneier

1990s work on quantum computer and quantum cryptography

- work on biometrics for authentication (finger prints, the iris, smells, etc.)

1996 France liberates its cryptography law: one now can use cryptography if registered

- OECD issues Cryptography Policy Guidelines; a paper calling for encryption exports-standards and unrestricted access to encryption products

1997 April European Commission issues Electronic Commerce Initiative, in favor of strong encryption

1997 June PGP 5.0 Freeware widely available for non-commercial use

1997 June 56-bit DES code cracked by a network of 14,000 computers

1997 August U.S. judge assesses encryption export regulations as violation of the First Amendment

1998 February foundation of Americans for Computer Privacy, a broad coalition in opposition to the U.S. cryptography policy

1998 March PGP announces plans to sell encryption products outside the USA

1998 April NSA issues a report about the risks of key recovery systems

1998 July DES code cracked in 56 hours by researchers in Silicon Valley

1998 October Finnish government agrees to unrestricted export of strong encryption

1999 January RSA Data Security, establishes worldwide distribution of encryption product outside the USA

- National Institute of Standards and Technologies announces that 56-bit DES is not safe compared to Triple DES

- 56-bit DES code is cracked in 22 hours and 15 minutes

1999 May 27 United Kingdom speaks out against key recovery

1999 Sept: the USA announce to stop the restriction of cryptography-exports

2000 as the German government wants to elaborate a cryptography-law, different organizations start a campaign against that law

- computer hackers do no longer only visit websites and change little details there but cause breakdowns of entire systems, producing big economic losses

for further information about the history of cryptography see:
http://www.clark.net/pub/cme/html/timeline.html
http://www.math.nmsu.edu/~crypto/Timeline.html
http://fly.hiwaay.net/~paul/cryptology/history.html
http://www.achiever.com/freehmpg/cryptology/hocryp.html
http://all.net/books/ip/Chap2-1.html
http://cryptome.org/ukpk-alt.htm
http://www.iwm.org.uk/online/enigma/eni-intro.htm
http://www.achiever.com/freehmpg/cryptology/cryptofr.html
http://www.cdt.org/crypto/milestones.shtml

for information about hacker's history see:
http://www.farcaster.com/sterling/chronology.htm:

TEXTBLOCK 3/7 // URL: http://world-information.org/wio/infostructure/100437611776/100438658960
 
Timeline 1900-1970 AD

1913 the wheel cipher gets re-invented as a strip

1917 William Frederick Friedman starts working as a cryptoanalyst at Riverbank Laboratories, which also works for the U.S. Government. Later he creates a school for military cryptoanalysis

- an AT&T-employee, Gilbert S. Vernam, invents a polyalphabetic cipher machine that works with random-keys

1918 the Germans start using the ADFGVX-system, that later gets later by the French Georges Painvin

- Arthur Scherbius patents a ciphering machine and tries to sell it to the German Military, but is rejected

1919 Hugo Alexander Koch invents a rotor cipher machine

1921 the Hebern Electric Code, a company producing electro-mechanical cipher machines, is founded

1923 Arthur Scherbius founds an enterprise to construct and finally sell his Enigma machine for the German Military

late 1920's/30's more and more it is criminals who use cryptology for their purposes (e.g. for smuggling). Elizabeth Smith Friedman deciphers the codes of rum-smugglers during prohibition regularly

1929 Lester S. Hill publishes his book Cryptography in an Algebraic Alphabet, which contains enciphered parts

1933-1945 the Germans make the Enigma machine its cryptographic main-tool, which is broken by the Poles Marian Rejewski, Gordon Welchman and Alan Turing's team at Bletchley Park in England in 1939

1937 the Japanese invent their so called Purple machine with the help of Herbert O. Yardley. The machine works with telephone stepping relays. It is broken by a team of William Frederick Friedman. As the Japanese were unable to break the US codes, they imagined their own codes to be unbreakable as well - and were not careful enough.

1930's the Sigaba machine is invented in the USA, either by W.F. Friedman or his colleague Frank Rowlett

- at the same time the British develop the Typex machine, similar to the German Enigma machine

1943 Colossus, a code breaking computer is put into action at Bletchley Park

1943-1980 the cryptographic Venona Project, done by the NSA, is taking place for a longer period than any other program of that type

1948 Shannon, one of the first modern cryptographers bringing mathematics into cryptography, publishes his book A Communications Theory of Secrecy Systems

1960's the Communications-Electronics Security Group (= CESG) is founded as a section of Government Communications Headquarters (= GCHQ)

late 1960's the IBM Watson Research Lab develops the Lucifer cipher

1969 James Ellis develops a system of separate public-keys and private-keys

TEXTBLOCK 4/7 // URL: http://world-information.org/wio/infostructure/100437611776/100438658921
 
History: "The South"

In many traditional Southern countries awe and mystery surround the created object into which the creator projects spirit and soul. Also in contrast with the Western individual-based concept of intellectual property rights it is custom to recognize 'collective', 'communal' or 'folkloric' copyright. Folkloric copyright acknowledges rights to all kinds of knowledge, ideas and innovations produced in 'intellectual commons'. Such rights are not limited to the lifetime of an individual but rather exist in perpetuity with a specific group or an entire people.

Islamic Tradition

Already early Islamic jurists recognized a creator's right or copyright and offered protection against piracy. Traditional Islamic law treats infringement as a breach of ethics, not as a criminal act of theft. Punishment is carried out in the form of defamation of the infringer and the casting of shame on his tribe. Only in recent years many Islamic countries have adopted formal copyright statutes.

TEXTBLOCK 5/7 // URL: http://world-information.org/wio/infostructure/100437611725/100438659436
 
Convergence

TEXTBLOCK 6/7 // URL: http://world-information.org/wio/infostructure/100437611795/100438659138
 
1400 - 1500 A.D.

1455
Johannes Gutenberg publishes the Bible as the first book in Europe by means of a movable metal font.

Gutenberg's printing press was an innovative aggregation of inventions known for centuries before Gutenberg: the olive oil press, oil-based ink, block-print technology, and movable types allowed the mass production of the movable type used to reproduce a page of text and enormously increased the production rate. During the Middle Ages it took monks at least a year to make a handwritten copy of a book. Gutenberg could print about 300 sheets per day. Because parchment was too costly for mass production - for the production of one copy of a medieval book often a whole flock of sheep was used - it was substituted by cheap paper made from recycled clothing of the massive number of deads caused by the Great Plague.

Within forty-five years, in 1500, ten million copies were available for a few hundred thousand literate people. Because individuals could examine a range of opinions now, the printed Bible - especially after having been translated into German by Martin Luther - and increasing literacy added to the subversion of clerical authorities. The interest in books grew with the rise of vernacular, non-Latin literary texts, beginning with Dante's Divine Comedy, the first literary text written in Italian.

Among others the improvement of the distribution and production of books as well as increased literacy made the development of print mass media possible.

Michael Giesecke (Sinnenwandel Sprachwandel Kulturwandel. Studien zur Vorgeschichte der Informationsgesellschaft, Frankfurt am Main: Suhrkamp, 1992) has shown that due to a division of labor among authors, printers and typesetters Gutenberg's invention increasingly led to a standardization of - written and unwritten - language in form of orthography, grammar and signs. To communicate one's ideas became linked to the use of a code, and reading became a kind of rite of passage, an important step towards independency in a human's life.

With the growing linkage of knowledge to reading and learning, the history of knowledge becomes the history of reading, of reading dependent on chance and circumstance.

For further details see:
Martin Warnke, Text und Technik, http://www.uni-lueneburg.de/
Bruce Jones, Manuscripts, Books, and Maps: The Printing Press and a Changing World, http://communication.ucsd.edu/bjones/Books/booktext.html

TEXTBLOCK 7/7 // URL: http://world-information.org/wio/infostructure/100437611796/100438659777
 
Internet Software Consortium

The Internet Software Consortium (ISC) is a nonprofit corporation dedicated to the production of high-quality reference implementations of Internet standards that meet production standards. Its goal is to ensure that those reference implementations are properly supported and made freely available to the Internet community.

http://www.isc.org

INDEXCARD, 1/5
 
PGP

A cryptographic software application that was developed by Phil Zimmerman at the Massachusetts Institute of Technology. Pretty Good Privacy (PGP) is a cryptographic product family that enables people to securely exchange messages, and to secure files, disk volumes and network connections with both privacy and strong authentication.

INDEXCARD, 2/5
 
blowfish encryption algorithm

Blowfish is a symmetric key block cipher that can vary its length.
The idea behind is a simple design to make the system faster than others.

http://www.counterpane.com/blowfish.html
http://www.counterpane.com/bfsverlag.html

http://www.counterpane.com/blowfish.html
http://www.counterpane.com/blowfish.html
INDEXCARD, 3/5
 
Bruce Schneier

Bruce Schneier is president of Counterpane Systems in Minneapolis. This consulting enterprise specialized in cryptography and computer security. He is the author of the book Applied Cryptography and inventor of the Blowfish and Twofish encryption algorithms.

INDEXCARD, 4/5
 
RSA

The best known of the two-key cryptosystems developed in the mid-1980s is the Rivest-Shamir-Adleman (RSA) cryptoalgorithm, which was first published in April, 1977. Since that time, the algorithm has been employed in the most widely-used Internet electronic communications encryption program, Pretty Good Privacy (PGP). It is also employed in both the Netscape Navigator and Microsoft Explorer web browsing programs in their implementations of the Secure Sockets Layer (SSL), and by Mastercard and VISA in the Secure Electronic Transactions (SET) protocol for credit card transactions.

INDEXCARD, 5/5