AccueilGroupesDiscussionsPlusTendances
Site de recherche
Ce site utilise des cookies pour fournir nos services, optimiser les performances, pour les analyses, et (si vous n'êtes pas connecté) pour les publicités. En utilisant Librarything, vous reconnaissez avoir lu et compris nos conditions générales d'utilisation et de services. Votre utilisation du site et de ses services vaut acceptation de ces conditions et termes.

Résultats trouvés sur Google Books

Cliquer sur une vignette pour aller sur Google Books.

Chargement...

Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age (2001)

par Steven Levy

Autres auteurs: Voir la section autres auteur(e)s.

MembresCritiquesPopularitéÉvaluation moyenneMentions
8831524,102 (3.94)7
If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy-the author who made "hackers" a household word-comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of "crypto rebels"-nerds and visionaries turned freedom fighters-teamed up with corporate interests to beat Big Brother and ensure our privacy on the Internet. Levy's history of one of the most controversial and important topics of the digital age sounds like the best futuristic fiction.… (plus d'informations)
Chargement...

Inscrivez-vous à LibraryThing pour découvrir si vous aimerez ce livre

Actuellement, il n'y a pas de discussions au sujet de ce livre.

» Voir aussi les 7 mentions

If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or crypto, in action. From Stephen Levy--the author who made hackers a household word--comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of crypto rebels—nerds and visionaries turned freedom fighters—teamed up with corporate interests to beat Big Brother and ensure our privacy on the Internet. Levy's history of one of the most controversial and important topics of the digital age reads like the best futuristic fiction.
  lpdd | Apr 15, 2023 |
It just happens that soon after reading this book, I took a proper cryptology class as part of my computer science undergrad. This book was both: a) an awesome lesson in history, and b) an awesome 101-primer for anyone (let alone a student about to dive into the nittier/grittier details of math/etc.).

Absolutely loved this book. ( )
  jzacsh | Sep 9, 2020 |
The story of Whit Diffie and Martin Hellman who solved the problem of key exchange and Phil Zimmerman who gave it to the world. Great story writen in Steven Levy's easy reading style. ( )
  DoesNotCompute | May 21, 2020 |
Excellent! This is a really interesting history of the development of public crypto and the interaction with NSA and FBI over it. This is a battle we were just fighting in the 90s and are already fighting again. You'll be surprised at how many parallels there are. The same players, the same arguments. This is a definite must-read if you want context for the current crypto debates going on, including #AppleVsFBI. ( )
  typo180 | Jan 2, 2017 |
This book is about the battle for privacy: a battle that pitted nobodies against the world's most powerful people and governments. The nobodies won. Governments have always had a substantial stake in restricting access to information, often for very good reasons, but individuals need to protect their personal information also. The computer provided the means for incredibly powerful cryptographic tools, and those in power wanted to keep those tools to themselves. Whitfield Diffie was a contrarian. A genius, he didn't decide to learn to read until he was ten years old because he so enjoyed having his parents read to him. Once he decided to learn, he read everything, and he was particularly drawn to books about cryptography, the science of encoding information.

Interestingly, he was less interested in cryptanalysis and decoding. For a while he lost interest, thinking all the interesting work had already been done. After working at MIT, he moved on to indulge his passion for mathematics and computer programming and eventually [b:artificial intelligence|27543|Artificial Intelligence A Modern Approach (2nd Edition)|Stuart J. Russell|http://photo.goodreads.com/books/1167881696s/27543.jpg|1362]. While his hacker friends were indulging themselves breaking into other computers to see if it could be done, Diffie worked on software to prevent such intrusions. Then he read David Kahn's classic [b:The Codebreakers|17994|The Code Book The Science of Secrecy from Ancient Egypt to Quantum Cryptography|Simon Singh|http://photo.goodreads.com/books/1166855238s/17994.jpg|1031975] that revealed how much secret work was being done by the NSA (formerly known as No Such Agency). He realized an enormous amount of work was being done behind closed doors, and that offended his sense of propriety since privacy for individuals was important too. Encryption had become essential with the advent of the Internet.. Digital signatures, for example could be easily copied, as could digital documents, so how could they be made secure without slowing down transactions? In 1977, three MIT professors who had been intrigued by Diffie's work discovered the mechanism that would strike terror in the hearts of cryptanalysts (those who break codes). Using factoring of prime numbers as the focal point, they realized that a 129-digit product of two prime numbers would require millions of years to break by brute strength (computer analysis of all the possibilities), but that anyone who had a private key of one of the prime numbers could easily decode the message. Thus the key that performed the encryption could be made public -- indeed, the wider the dissemination the better. For a better explanation read the book. We’re pushing my envelope here.

The National Security Agency, better known as the NSA, an agency that in its early years did not even admit to its own existence, began a campaign to thwart the work of the mathematicians. Even after the Justice Department had ruled that the ITAR regulations (these prevented dissemination of even published papers) were unconstitutional, the agency was trying to use them to scare anyone working on novel forms of cryptography. In other words, in spite of their having sworn allegiance to the Constitution, the agency and its employees were operating in a manner that the legal arm of the government had said was clearly unconstitutional. Shades of Oliver North, who always thought he could be the sole interpreter of the Constitution.

The epitome of the governmental role in trying to thwart the proverbial horse from escaping the barn was the Clipper chip. This hardware device was designed to be placed in every device that might conceivably be used for communications, from computers to telephones. Initially proposed by the NSA with the concurrence of the FBI and National Institutes of Standards, the device would use an escrow key; that is, every time it was used a key would be sent to a government agency theoretically to be stored until such time as the government needed to get at the conversation. Unfortunately, the Clinton administration, techno-freaks though they professed to be, completely misread the mood of the country. After all, would you leave a key to your house at the police station so they could get in any time they wanted? The reaction from foreign countries was astonishment. They were supposed to give the U.S. government access to private business conversations, etc.? The hubris of it all.

The crowning blow, despite polls that showed 80% of the country being opposed to the Clipper chip, was when a consultant hired by the NSA to test the chip showed it could be broken. It took him 42 minutes after realizing that the checksum used to verify the key being sent to law enforcement was only sixteen bits and could be computationally broken by a home PC. That made it the subject of ridicule and it was doomed. Levy’s book is a real page-turner and a classic analysis of how of technology outpaces policy.

( )
  ecw0647 | Sep 30, 2013 |
Affichage de 1-5 de 14 (suivant | tout afficher)
aucune critique | ajouter une critique

» Ajouter d'autres auteur(e)s (2 possibles)

Nom de l'auteurRôleType d'auteurŒuvre ?Statut
Steven Levyauteur principaltoutes les éditionscalculé
Resnick, NancyConcepteurauteur secondairequelques éditionsconfirmé

Appartient à la série éditoriale

Vous devez vous identifier pour modifier le Partage des connaissances.
Pour plus d'aide, voir la page Aide sur le Partage des connaissances [en anglais].
Titre canonique
Titre original
Titres alternatifs
Date de première publication
Personnes ou personnages
Informations provenant du Partage des connaissances anglais. Modifiez pour passer à votre langue.
Lieux importants
Informations provenant du Partage des connaissances anglais. Modifiez pour passer à votre langue.
Évènements importants
Films connexes
Épigraphe
Dédicace
Informations provenant du Partage des connaissances anglais. Modifiez pour passer à votre langue.
To Teresa and Andrew
Premiers mots
Informations provenant du Partage des connaissances anglais. Modifiez pour passer à votre langue.
Mary Fischer loathed Whitfield Diffie on sight.
Citations
Derniers mots
Informations provenant du Partage des connaissances anglais. Modifiez pour passer à votre langue.
Notice de désambigüisation
Directeur de publication
Courtes éloges de critiques
Langue d'origine
Informations provenant du Partage des connaissances anglais. Modifiez pour passer à votre langue.
DDC/MDS canonique
LCC canonique

Références à cette œuvre sur des ressources externes.

Wikipédia en anglais (5)

If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy-the author who made "hackers" a household word-comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of "crypto rebels"-nerds and visionaries turned freedom fighters-teamed up with corporate interests to beat Big Brother and ensure our privacy on the Internet. Levy's history of one of the most controversial and important topics of the digital age sounds like the best futuristic fiction.

Aucune description trouvée dans une bibliothèque

Description du livre
Résumé sous forme de haïku

Discussion en cours

Aucun

Couvertures populaires

Vos raccourcis

Évaluation

Moyenne: (3.94)
0.5
1 1
1.5
2 5
2.5 1
3 23
3.5 6
4 59
4.5 8
5 29

Est-ce vous ?

Devenez un(e) auteur LibraryThing.

 

À propos | Contact | LibraryThing.com | Respect de la vie privée et règles d'utilisation | Aide/FAQ | Blog | Boutique | APIs | TinyCat | Bibliothèques historiques | Critiques en avant-première | Partage des connaissances | 203,239,222 livres! | Barre supérieure: Toujours visible