StartGroepenDiscussieMeerTijdgeest
Doorzoek de site
Onze site gebruikt cookies om diensten te leveren, prestaties te verbeteren, voor analyse en (indien je niet ingelogd bent) voor advertenties. Door LibraryThing te gebruiken erken je dat je onze Servicevoorwaarden en Privacybeleid gelezen en begrepen hebt. Je gebruik van de site en diensten is onderhevig aan dit beleid en deze voorwaarden.

Resultaten uit Google Boeken

Klik op een omslag om naar Google Boeken te gaan.

Bezig met laden...

Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age (2001)

door Steven Levy

Andere auteurs: Zie de sectie andere auteurs.

LedenBesprekingenPopulariteitGemiddelde beoordelingAanhalingen
8841524,353 (3.94)7
If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy-the author who made "hackers" a household word-comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of "crypto rebels"-nerds and visionaries turned freedom fighters-teamed up with corporate interests to beat Big Brother and ensure our privacy on the Internet. Levy's history of one of the most controversial and important topics of the digital age sounds like the best futuristic fiction.… (meer)
Bezig met laden...

Meld je aan bij LibraryThing om erachter te komen of je dit boek goed zult vinden.

Op dit moment geen Discussie gesprekken over dit boek.

» Zie ook 7 vermeldingen

1-5 van 14 worden getoond (volgende | toon alle)
If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or crypto, in action. From Stephen Levy--the author who made hackers a household word--comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of crypto rebels—nerds and visionaries turned freedom fighters—teamed up with corporate interests to beat Big Brother and ensure our privacy on the Internet. Levy's history of one of the most controversial and important topics of the digital age reads like the best futuristic fiction.
  lpdd | Apr 15, 2023 |
It just happens that soon after reading this book, I took a proper cryptology class as part of my computer science undergrad. This book was both: a) an awesome lesson in history, and b) an awesome 101-primer for anyone (let alone a student about to dive into the nittier/grittier details of math/etc.).

Absolutely loved this book. ( )
  jzacsh | Sep 9, 2020 |
The story of Whit Diffie and Martin Hellman who solved the problem of key exchange and Phil Zimmerman who gave it to the world. Great story writen in Steven Levy's easy reading style. ( )
  DoesNotCompute | May 21, 2020 |
Excellent! This is a really interesting history of the development of public crypto and the interaction with NSA and FBI over it. This is a battle we were just fighting in the 90s and are already fighting again. You'll be surprised at how many parallels there are. The same players, the same arguments. This is a definite must-read if you want context for the current crypto debates going on, including #AppleVsFBI. ( )
  typo180 | Jan 2, 2017 |
This book is about the battle for privacy: a battle that pitted nobodies against the world's most powerful people and governments. The nobodies won. Governments have always had a substantial stake in restricting access to information, often for very good reasons, but individuals need to protect their personal information also. The computer provided the means for incredibly powerful cryptographic tools, and those in power wanted to keep those tools to themselves. Whitfield Diffie was a contrarian. A genius, he didn't decide to learn to read until he was ten years old because he so enjoyed having his parents read to him. Once he decided to learn, he read everything, and he was particularly drawn to books about cryptography, the science of encoding information.

Interestingly, he was less interested in cryptanalysis and decoding. For a while he lost interest, thinking all the interesting work had already been done. After working at MIT, he moved on to indulge his passion for mathematics and computer programming and eventually [b:artificial intelligence|27543|Artificial Intelligence A Modern Approach (2nd Edition)|Stuart J. Russell|http://photo.goodreads.com/books/1167881696s/27543.jpg|1362]. While his hacker friends were indulging themselves breaking into other computers to see if it could be done, Diffie worked on software to prevent such intrusions. Then he read David Kahn's classic [b:The Codebreakers|17994|The Code Book The Science of Secrecy from Ancient Egypt to Quantum Cryptography|Simon Singh|http://photo.goodreads.com/books/1166855238s/17994.jpg|1031975] that revealed how much secret work was being done by the NSA (formerly known as No Such Agency). He realized an enormous amount of work was being done behind closed doors, and that offended his sense of propriety since privacy for individuals was important too. Encryption had become essential with the advent of the Internet.. Digital signatures, for example could be easily copied, as could digital documents, so how could they be made secure without slowing down transactions? In 1977, three MIT professors who had been intrigued by Diffie's work discovered the mechanism that would strike terror in the hearts of cryptanalysts (those who break codes). Using factoring of prime numbers as the focal point, they realized that a 129-digit product of two prime numbers would require millions of years to break by brute strength (computer analysis of all the possibilities), but that anyone who had a private key of one of the prime numbers could easily decode the message. Thus the key that performed the encryption could be made public -- indeed, the wider the dissemination the better. For a better explanation read the book. We’re pushing my envelope here.

The National Security Agency, better known as the NSA, an agency that in its early years did not even admit to its own existence, began a campaign to thwart the work of the mathematicians. Even after the Justice Department had ruled that the ITAR regulations (these prevented dissemination of even published papers) were unconstitutional, the agency was trying to use them to scare anyone working on novel forms of cryptography. In other words, in spite of their having sworn allegiance to the Constitution, the agency and its employees were operating in a manner that the legal arm of the government had said was clearly unconstitutional. Shades of Oliver North, who always thought he could be the sole interpreter of the Constitution.

The epitome of the governmental role in trying to thwart the proverbial horse from escaping the barn was the Clipper chip. This hardware device was designed to be placed in every device that might conceivably be used for communications, from computers to telephones. Initially proposed by the NSA with the concurrence of the FBI and National Institutes of Standards, the device would use an escrow key; that is, every time it was used a key would be sent to a government agency theoretically to be stored until such time as the government needed to get at the conversation. Unfortunately, the Clinton administration, techno-freaks though they professed to be, completely misread the mood of the country. After all, would you leave a key to your house at the police station so they could get in any time they wanted? The reaction from foreign countries was astonishment. They were supposed to give the U.S. government access to private business conversations, etc.? The hubris of it all.

The crowning blow, despite polls that showed 80% of the country being opposed to the Clipper chip, was when a consultant hired by the NSA to test the chip showed it could be broken. It took him 42 minutes after realizing that the checksum used to verify the key being sent to law enforcement was only sixteen bits and could be computationally broken by a home PC. That made it the subject of ridicule and it was doomed. Levy’s book is a real page-turner and a classic analysis of how of technology outpaces policy.

( )
  ecw0647 | Sep 30, 2013 |
1-5 van 14 worden getoond (volgende | toon alle)
geen besprekingen | voeg een bespreking toe

» Andere auteurs toevoegen (2 mogelijk)

AuteursnaamRolType auteurWerk?Status
Steven Levyprimaire auteuralle editiesberekend
Resnick, NancyOntwerperSecundaire auteursommige editiesbevestigd

Onderdeel van de uitgeversreeks(en)

Je moet ingelogd zijn om Algemene Kennis te mogen bewerken.
Voor meer hulp zie de helppagina Algemene Kennis .
Gangbare titel
Oorspronkelijke titel
Alternatieve titels
Oorspronkelijk jaar van uitgave
Mensen/Personages
Informatie afkomstig uit de Engelse Algemene Kennis. Bewerk om naar jouw taal over te brengen.
Belangrijke plaatsen
Informatie afkomstig uit de Engelse Algemene Kennis. Bewerk om naar jouw taal over te brengen.
Belangrijke gebeurtenissen
Verwante films
Motto
Opdracht
Informatie afkomstig uit de Engelse Algemene Kennis. Bewerk om naar jouw taal over te brengen.
To Teresa and Andrew
Eerste woorden
Informatie afkomstig uit de Engelse Algemene Kennis. Bewerk om naar jouw taal over te brengen.
Mary Fischer loathed Whitfield Diffie on sight.
Citaten
Laatste woorden
Informatie afkomstig uit de Engelse Algemene Kennis. Bewerk om naar jouw taal over te brengen.
Ontwarringsbericht
Uitgevers redacteuren
Auteur van flaptekst/aanprijzing
Oorspronkelijke taal
Informatie afkomstig uit de Engelse Algemene Kennis. Bewerk om naar jouw taal over te brengen.
Gangbare DDC/MDS
Canonieke LCC
If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy-the author who made "hackers" a household word-comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of "crypto rebels"-nerds and visionaries turned freedom fighters-teamed up with corporate interests to beat Big Brother and ensure our privacy on the Internet. Levy's history of one of the most controversial and important topics of the digital age sounds like the best futuristic fiction.

Geen bibliotheekbeschrijvingen gevonden.

Boekbeschrijving
Haiku samenvatting

Actuele discussies

Geen

Populaire omslagen

Snelkoppelingen

Waardering

Gemiddelde: (3.94)
0.5
1 1
1.5
2 5
2.5 1
3 23
3.5 6
4 59
4.5 8
5 29

Ben jij dit?

Word een LibraryThing Auteur.

 

Over | Contact | LibraryThing.com | Privacy/Voorwaarden | Help/Veelgestelde vragen | Blog | Winkel | APIs | TinyCat | Nagelaten Bibliotheken | Vroege Recensenten | Algemene kennis | 205,275,453 boeken! | Bovenbalk: Altijd zichtbaar