KotiRyhmätKeskusteluLisääAjan henki
Etsi sivustolta
Tämä sivusto käyttää evästeitä palvelujen toimittamiseen, toiminnan parantamiseen, analytiikkaan ja (jos et ole kirjautunut sisään) mainostamiseen. Käyttämällä LibraryThingiä ilmaiset, että olet lukenut ja ymmärtänyt käyttöehdot ja yksityisyydensuojakäytännöt. Sivujen ja palveluiden käytön tulee olla näiden ehtojen ja käytäntöjen mukaista.

Tulokset Google Booksista

Pikkukuvaa napsauttamalla pääset Google Booksiin.

Crypto: How the Code Rebels Beat the…
Ladataan...

Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age (alkuperäinen julkaisuvuosi 2001; vuoden 2002 painos)

Tekijä: Steven Levy (Tekijä)

JäseniäKirja-arvostelujaSuosituimmuussijaKeskimääräinen arvioMaininnat
8841524,234 (3.94)7
If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy-the author who made "hackers" a household word-comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of "crypto rebels"-nerds and visionaries turned freedom fighters-teamed up with corporate interests to beat Big Brother and ensure our privacy on the Internet. Levy's history of one of the most controversial and important topics of the digital age sounds like the best futuristic fiction.… (lisätietoja)
Jäsen:Floyd3345
Teoksen nimi:Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age
Kirjailijat:Steven Levy (Tekijä)
Info:Penguin Books (2001), Edition: 1st, 368 pages
Kokoelmat:Oma kirjasto
Arvio (tähdet):
Avainsanoja:to-read

Teostiedot

Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age (tekijä: Steven Levy) (2001)

Ladataan...

Kirjaudu LibraryThingiin nähdäksesi, pidätkö tästä kirjasta vai et.

Ei tämänhetkisiä Keskustelu-viestiketjuja tästä kirjasta.

» Katso myös 7 mainintaa

Näyttää 1-5 (yhteensä 14) (seuraava | näytä kaikki)
If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or crypto, in action. From Stephen Levy--the author who made hackers a household word--comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of crypto rebels—nerds and visionaries turned freedom fighters—teamed up with corporate interests to beat Big Brother and ensure our privacy on the Internet. Levy's history of one of the most controversial and important topics of the digital age reads like the best futuristic fiction.
  lpdd | Apr 15, 2023 |
It just happens that soon after reading this book, I took a proper cryptology class as part of my computer science undergrad. This book was both: a) an awesome lesson in history, and b) an awesome 101-primer for anyone (let alone a student about to dive into the nittier/grittier details of math/etc.).

Absolutely loved this book. ( )
  jzacsh | Sep 9, 2020 |
The story of Whit Diffie and Martin Hellman who solved the problem of key exchange and Phil Zimmerman who gave it to the world. Great story writen in Steven Levy's easy reading style. ( )
  DoesNotCompute | May 21, 2020 |
Excellent! This is a really interesting history of the development of public crypto and the interaction with NSA and FBI over it. This is a battle we were just fighting in the 90s and are already fighting again. You'll be surprised at how many parallels there are. The same players, the same arguments. This is a definite must-read if you want context for the current crypto debates going on, including #AppleVsFBI. ( )
  typo180 | Jan 2, 2017 |
This book is about the battle for privacy: a battle that pitted nobodies against the world's most powerful people and governments. The nobodies won. Governments have always had a substantial stake in restricting access to information, often for very good reasons, but individuals need to protect their personal information also. The computer provided the means for incredibly powerful cryptographic tools, and those in power wanted to keep those tools to themselves. Whitfield Diffie was a contrarian. A genius, he didn't decide to learn to read until he was ten years old because he so enjoyed having his parents read to him. Once he decided to learn, he read everything, and he was particularly drawn to books about cryptography, the science of encoding information.

Interestingly, he was less interested in cryptanalysis and decoding. For a while he lost interest, thinking all the interesting work had already been done. After working at MIT, he moved on to indulge his passion for mathematics and computer programming and eventually [b:artificial intelligence|27543|Artificial Intelligence A Modern Approach (2nd Edition)|Stuart J. Russell|http://photo.goodreads.com/books/1167881696s/27543.jpg|1362]. While his hacker friends were indulging themselves breaking into other computers to see if it could be done, Diffie worked on software to prevent such intrusions. Then he read David Kahn's classic [b:The Codebreakers|17994|The Code Book The Science of Secrecy from Ancient Egypt to Quantum Cryptography|Simon Singh|http://photo.goodreads.com/books/1166855238s/17994.jpg|1031975] that revealed how much secret work was being done by the NSA (formerly known as No Such Agency). He realized an enormous amount of work was being done behind closed doors, and that offended his sense of propriety since privacy for individuals was important too. Encryption had become essential with the advent of the Internet.. Digital signatures, for example could be easily copied, as could digital documents, so how could they be made secure without slowing down transactions? In 1977, three MIT professors who had been intrigued by Diffie's work discovered the mechanism that would strike terror in the hearts of cryptanalysts (those who break codes). Using factoring of prime numbers as the focal point, they realized that a 129-digit product of two prime numbers would require millions of years to break by brute strength (computer analysis of all the possibilities), but that anyone who had a private key of one of the prime numbers could easily decode the message. Thus the key that performed the encryption could be made public -- indeed, the wider the dissemination the better. For a better explanation read the book. We’re pushing my envelope here.

The National Security Agency, better known as the NSA, an agency that in its early years did not even admit to its own existence, began a campaign to thwart the work of the mathematicians. Even after the Justice Department had ruled that the ITAR regulations (these prevented dissemination of even published papers) were unconstitutional, the agency was trying to use them to scare anyone working on novel forms of cryptography. In other words, in spite of their having sworn allegiance to the Constitution, the agency and its employees were operating in a manner that the legal arm of the government had said was clearly unconstitutional. Shades of Oliver North, who always thought he could be the sole interpreter of the Constitution.

The epitome of the governmental role in trying to thwart the proverbial horse from escaping the barn was the Clipper chip. This hardware device was designed to be placed in every device that might conceivably be used for communications, from computers to telephones. Initially proposed by the NSA with the concurrence of the FBI and National Institutes of Standards, the device would use an escrow key; that is, every time it was used a key would be sent to a government agency theoretically to be stored until such time as the government needed to get at the conversation. Unfortunately, the Clinton administration, techno-freaks though they professed to be, completely misread the mood of the country. After all, would you leave a key to your house at the police station so they could get in any time they wanted? The reaction from foreign countries was astonishment. They were supposed to give the U.S. government access to private business conversations, etc.? The hubris of it all.

The crowning blow, despite polls that showed 80% of the country being opposed to the Clipper chip, was when a consultant hired by the NSA to test the chip showed it could be broken. It took him 42 minutes after realizing that the checksum used to verify the key being sent to law enforcement was only sixteen bits and could be computationally broken by a home PC. That made it the subject of ridicule and it was doomed. Levy’s book is a real page-turner and a classic analysis of how of technology outpaces policy.

( )
  ecw0647 | Sep 30, 2013 |
Näyttää 1-5 (yhteensä 14) (seuraava | näytä kaikki)
ei arvosteluja | lisää arvostelu

» Lisää muita tekijöitä (2 mahdollista)

Tekijän nimiRooliTekijän tyyppiKoskeeko teosta?Tila
Steven Levyensisijainen tekijäkaikki painoksetlaskettu
Resnick, NancySuunnittelijamuu tekijäeräät painoksetvahvistettu

Kuuluu näihin kustantajien sarjoihin

Sinun täytyy kirjautua sisään voidaksesi muokata Yhteistä tietoa
Katso lisäohjeita Common Knowledge -sivuilta (englanniksi).
Teoksen kanoninen nimi
Alkuteoksen nimi
Teoksen muut nimet
Alkuperäinen julkaisuvuosi
Henkilöt/hahmot
Tiedot englanninkielisestä Yhteisestä tiedosta. Muokkaa kotoistaaksesi se omalle kielellesi.
Tärkeät paikat
Tiedot englanninkielisestä Yhteisestä tiedosta. Muokkaa kotoistaaksesi se omalle kielellesi.
Tärkeät tapahtumat
Kirjaan liittyvät elokuvat
Epigrafi (motto tai mietelause kirjan alussa)
Omistuskirjoitus
Tiedot englanninkielisestä Yhteisestä tiedosta. Muokkaa kotoistaaksesi se omalle kielellesi.
To Teresa and Andrew
Ensimmäiset sanat
Tiedot englanninkielisestä Yhteisestä tiedosta. Muokkaa kotoistaaksesi se omalle kielellesi.
Mary Fischer loathed Whitfield Diffie on sight.
Sitaatit
Viimeiset sanat
Tiedot englanninkielisestä Yhteisestä tiedosta. Muokkaa kotoistaaksesi se omalle kielellesi.
Erotteluhuomautus
Julkaisutoimittajat
Kirjan kehujat
Alkuteoksen kieli
Tiedot englanninkielisestä Yhteisestä tiedosta. Muokkaa kotoistaaksesi se omalle kielellesi.
Kanoninen DDC/MDS
Kanoninen LCC

Viittaukset tähän teokseen muissa lähteissä.

Englanninkielinen Wikipedia (5)

If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy-the author who made "hackers" a household word-comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of "crypto rebels"-nerds and visionaries turned freedom fighters-teamed up with corporate interests to beat Big Brother and ensure our privacy on the Internet. Levy's history of one of the most controversial and important topics of the digital age sounds like the best futuristic fiction.

Kirjastojen kuvailuja ei löytynyt.

Kirjan kuvailu
Yhteenveto haiku-muodossa

Current Discussions

-

Suosituimmat kansikuvat

Pikalinkit

Arvio (tähdet)

Keskiarvo: (3.94)
0.5
1 1
1.5
2 5
2.5 1
3 23
3.5 6
4 59
4.5 8
5 29

Oletko sinä tämä henkilö?

Tule LibraryThing-kirjailijaksi.

 

Lisätietoja | Ota yhteyttä | LibraryThing.com | Yksityisyyden suoja / Käyttöehdot | Apua/FAQ | Blogi | Kauppa | APIs | TinyCat | Perintökirjastot | Varhaiset kirja-arvostelijat | Yleistieto | 204,472,910 kirjaa! | Yläpalkki: Aina näkyvissä