StartseiteGruppenForumMehrZeitgeist
Web-Site durchsuchen
Diese Seite verwendet Cookies für unsere Dienste, zur Verbesserung unserer Leistungen, für Analytik und (falls Sie nicht eingeloggt sind) für Werbung. Indem Sie LibraryThing nutzen, erklären Sie dass Sie unsere Nutzungsbedingungen und Datenschutzrichtlinie gelesen und verstanden haben. Die Nutzung unserer Webseite und Dienste unterliegt diesen Richtlinien und Geschäftsbedingungen.

Ergebnisse von Google Books

Auf ein Miniaturbild klicken, um zu Google Books zu gelangen.

Crypto: How the Code Rebels Beat the…
Lädt ...

Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age (Original 2001; 2002. Auflage)

von Steven Levy

MitgliederRezensionenBeliebtheitDurchschnittliche BewertungDiskussionen
8861524,455 (3.94)7
If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy-the author who made "hackers" a household word-comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of "crypto rebels"-nerds and visionaries turned freedom fighters-teamed up with corporate interests to beat Big Brother and ensure our privacy on the Internet. Levy's history of one of the most controversial and important topics of the digital age sounds like the best futuristic fiction.… (mehr)
Mitglied:dgsweeney
Titel:Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age
Autoren:Steven Levy
Info:Penguin (Non-Classics) (2002), Edition: 1st, Paperback, 368 pages
Sammlungen:Deine Bibliothek
Bewertung:
Tags:Keine

Werk-Informationen

Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age von Steven Levy (2001)

Lädt ...

Melde dich bei LibraryThing an um herauszufinden, ob du dieses Buch mögen würdest.

If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or crypto, in action. From Stephen Levy--the author who made hackers a household word--comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of crypto rebels—nerds and visionaries turned freedom fighters—teamed up with corporate interests to beat Big Brother and ensure our privacy on the Internet. Levy's history of one of the most controversial and important topics of the digital age reads like the best futuristic fiction.
  lpdd | Apr 15, 2023 |
It just happens that soon after reading this book, I took a proper cryptology class as part of my computer science undergrad. This book was both: a) an awesome lesson in history, and b) an awesome 101-primer for anyone (let alone a student about to dive into the nittier/grittier details of math/etc.).

Absolutely loved this book. ( )
  jzacsh | Sep 9, 2020 |
The story of Whit Diffie and Martin Hellman who solved the problem of key exchange and Phil Zimmerman who gave it to the world. Great story writen in Steven Levy's easy reading style. ( )
  DoesNotCompute | May 21, 2020 |
Excellent! This is a really interesting history of the development of public crypto and the interaction with NSA and FBI over it. This is a battle we were just fighting in the 90s and are already fighting again. You'll be surprised at how many parallels there are. The same players, the same arguments. This is a definite must-read if you want context for the current crypto debates going on, including #AppleVsFBI. ( )
  typo180 | Jan 2, 2017 |
This book is about the battle for privacy: a battle that pitted nobodies against the world's most powerful people and governments. The nobodies won. Governments have always had a substantial stake in restricting access to information, often for very good reasons, but individuals need to protect their personal information also. The computer provided the means for incredibly powerful cryptographic tools, and those in power wanted to keep those tools to themselves. Whitfield Diffie was a contrarian. A genius, he didn't decide to learn to read until he was ten years old because he so enjoyed having his parents read to him. Once he decided to learn, he read everything, and he was particularly drawn to books about cryptography, the science of encoding information.

Interestingly, he was less interested in cryptanalysis and decoding. For a while he lost interest, thinking all the interesting work had already been done. After working at MIT, he moved on to indulge his passion for mathematics and computer programming and eventually [b:artificial intelligence|27543|Artificial Intelligence A Modern Approach (2nd Edition)|Stuart J. Russell|http://photo.goodreads.com/books/1167881696s/27543.jpg|1362]. While his hacker friends were indulging themselves breaking into other computers to see if it could be done, Diffie worked on software to prevent such intrusions. Then he read David Kahn's classic [b:The Codebreakers|17994|The Code Book The Science of Secrecy from Ancient Egypt to Quantum Cryptography|Simon Singh|http://photo.goodreads.com/books/1166855238s/17994.jpg|1031975] that revealed how much secret work was being done by the NSA (formerly known as No Such Agency). He realized an enormous amount of work was being done behind closed doors, and that offended his sense of propriety since privacy for individuals was important too. Encryption had become essential with the advent of the Internet.. Digital signatures, for example could be easily copied, as could digital documents, so how could they be made secure without slowing down transactions? In 1977, three MIT professors who had been intrigued by Diffie's work discovered the mechanism that would strike terror in the hearts of cryptanalysts (those who break codes). Using factoring of prime numbers as the focal point, they realized that a 129-digit product of two prime numbers would require millions of years to break by brute strength (computer analysis of all the possibilities), but that anyone who had a private key of one of the prime numbers could easily decode the message. Thus the key that performed the encryption could be made public -- indeed, the wider the dissemination the better. For a better explanation read the book. We’re pushing my envelope here.

The National Security Agency, better known as the NSA, an agency that in its early years did not even admit to its own existence, began a campaign to thwart the work of the mathematicians. Even after the Justice Department had ruled that the ITAR regulations (these prevented dissemination of even published papers) were unconstitutional, the agency was trying to use them to scare anyone working on novel forms of cryptography. In other words, in spite of their having sworn allegiance to the Constitution, the agency and its employees were operating in a manner that the legal arm of the government had said was clearly unconstitutional. Shades of Oliver North, who always thought he could be the sole interpreter of the Constitution.

The epitome of the governmental role in trying to thwart the proverbial horse from escaping the barn was the Clipper chip. This hardware device was designed to be placed in every device that might conceivably be used for communications, from computers to telephones. Initially proposed by the NSA with the concurrence of the FBI and National Institutes of Standards, the device would use an escrow key; that is, every time it was used a key would be sent to a government agency theoretically to be stored until such time as the government needed to get at the conversation. Unfortunately, the Clinton administration, techno-freaks though they professed to be, completely misread the mood of the country. After all, would you leave a key to your house at the police station so they could get in any time they wanted? The reaction from foreign countries was astonishment. They were supposed to give the U.S. government access to private business conversations, etc.? The hubris of it all.

The crowning blow, despite polls that showed 80% of the country being opposed to the Clipper chip, was when a consultant hired by the NSA to test the chip showed it could be broken. It took him 42 minutes after realizing that the checksum used to verify the key being sent to law enforcement was only sixteen bits and could be computationally broken by a home PC. That made it the subject of ridicule and it was doomed. Levy’s book is a real page-turner and a classic analysis of how of technology outpaces policy.

( )
  ecw0647 | Sep 30, 2013 |
keine Rezensionen | Rezension hinzufügen

» Andere Autoren hinzufügen (2 möglich)

AutorennameRolleArt des AutorsWerk?Status
Steven LevyHauptautoralle Ausgabenberechnet
Resnick, NancyGestaltungCo-Autoreinige Ausgabenbestätigt

Gehört zu Verlagsreihen

Du musst dich einloggen, um "Wissenswertes" zu bearbeiten.
Weitere Hilfe gibt es auf der "Wissenswertes"-Hilfe-Seite.
Gebräuchlichster Titel
Originaltitel
Alternative Titel
Ursprüngliches Erscheinungsdatum
Figuren/Charaktere
Die Informationen stammen von der englischen "Wissenswertes"-Seite. Ändern, um den Eintrag der eigenen Sprache anzupassen.
Wichtige Schauplätze
Die Informationen stammen von der englischen "Wissenswertes"-Seite. Ändern, um den Eintrag der eigenen Sprache anzupassen.
Wichtige Ereignisse
Zugehörige Filme
Epigraph (Motto/Zitat)
Widmung
Die Informationen stammen von der englischen "Wissenswertes"-Seite. Ändern, um den Eintrag der eigenen Sprache anzupassen.
To Teresa and Andrew
Erste Worte
Die Informationen stammen von der englischen "Wissenswertes"-Seite. Ändern, um den Eintrag der eigenen Sprache anzupassen.
Mary Fischer loathed Whitfield Diffie on sight.
Zitate
Letzte Worte
Die Informationen stammen von der englischen "Wissenswertes"-Seite. Ändern, um den Eintrag der eigenen Sprache anzupassen.
Hinweis zur Identitätsklärung
Verlagslektoren
Werbezitate von
Originalsprache
Die Informationen stammen von der englischen "Wissenswertes"-Seite. Ändern, um den Eintrag der eigenen Sprache anzupassen.
Anerkannter DDC/MDS
Anerkannter LCC

Literaturhinweise zu diesem Werk aus externen Quellen.

Wikipedia auf Englisch (5)

If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy-the author who made "hackers" a household word-comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of "crypto rebels"-nerds and visionaries turned freedom fighters-teamed up with corporate interests to beat Big Brother and ensure our privacy on the Internet. Levy's history of one of the most controversial and important topics of the digital age sounds like the best futuristic fiction.

Keine Bibliotheksbeschreibungen gefunden.

Buchbeschreibung
Zusammenfassung in Haiku-Form

Aktuelle Diskussionen

Keine

Beliebte Umschlagbilder

Gespeicherte Links

Bewertung

Durchschnitt: (3.94)
0.5
1 1
1.5
2 5
2.5 1
3 23
3.5 6
4 59
4.5 8
5 29

Bist das du?

Werde ein LibraryThing-Autor.

 

Über uns | Kontakt/Impressum | LibraryThing.com | Datenschutz/Nutzungsbedingungen | Hilfe/FAQs | Blog | LT-Shop | APIs | TinyCat | Nachlassbibliotheken | Vorab-Rezensenten | Wissenswertes | 206,518,433 Bücher! | Menüleiste: Immer sichtbar