Pagina principaleGruppiConversazioniAltroStatistiche
Cerca nel Sito
Questo sito utilizza i cookies per fornire i nostri servizi, per migliorare le prestazioni, per analisi, e (per gli utenti che accedono senza fare login) per la pubblicità. Usando LibraryThing confermi di aver letto e capito le nostre condizioni di servizio e la politica sulla privacy. Il tuo uso del sito e dei servizi è soggetto a tali politiche e condizioni.

Risultati da Google Ricerca Libri

Fai clic su di un'immagine per andare a Google Ricerca Libri.

Sto caricando le informazioni...

Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age (2001)

di Steven Levy

Altri autori: Vedi la sezione altri autori.

UtentiRecensioniPopolaritàMedia votiCitazioni
8841524,234 (3.94)7
If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy-the author who made "hackers" a household word-comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of "crypto rebels"-nerds and visionaries turned freedom fighters-teamed up with corporate interests to beat Big Brother and ensure our privacy on the Internet. Levy's history of one of the most controversial and important topics of the digital age sounds like the best futuristic fiction.… (altro)
Sto caricando le informazioni...

Iscriviti per consentire a LibraryThing di scoprire se ti piacerà questo libro.

Attualmente non vi sono conversazioni su questo libro.

» Vedi le 7 citazioni

If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or crypto, in action. From Stephen Levy--the author who made hackers a household word--comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of crypto rebels—nerds and visionaries turned freedom fighters—teamed up with corporate interests to beat Big Brother and ensure our privacy on the Internet. Levy's history of one of the most controversial and important topics of the digital age reads like the best futuristic fiction.
  lpdd | Apr 15, 2023 |
It just happens that soon after reading this book, I took a proper cryptology class as part of my computer science undergrad. This book was both: a) an awesome lesson in history, and b) an awesome 101-primer for anyone (let alone a student about to dive into the nittier/grittier details of math/etc.).

Absolutely loved this book. ( )
  jzacsh | Sep 9, 2020 |
The story of Whit Diffie and Martin Hellman who solved the problem of key exchange and Phil Zimmerman who gave it to the world. Great story writen in Steven Levy's easy reading style. ( )
  DoesNotCompute | May 21, 2020 |
Excellent! This is a really interesting history of the development of public crypto and the interaction with NSA and FBI over it. This is a battle we were just fighting in the 90s and are already fighting again. You'll be surprised at how many parallels there are. The same players, the same arguments. This is a definite must-read if you want context for the current crypto debates going on, including #AppleVsFBI. ( )
  typo180 | Jan 2, 2017 |
This book is about the battle for privacy: a battle that pitted nobodies against the world's most powerful people and governments. The nobodies won. Governments have always had a substantial stake in restricting access to information, often for very good reasons, but individuals need to protect their personal information also. The computer provided the means for incredibly powerful cryptographic tools, and those in power wanted to keep those tools to themselves. Whitfield Diffie was a contrarian. A genius, he didn't decide to learn to read until he was ten years old because he so enjoyed having his parents read to him. Once he decided to learn, he read everything, and he was particularly drawn to books about cryptography, the science of encoding information.

Interestingly, he was less interested in cryptanalysis and decoding. For a while he lost interest, thinking all the interesting work had already been done. After working at MIT, he moved on to indulge his passion for mathematics and computer programming and eventually [b:artificial intelligence|27543|Artificial Intelligence A Modern Approach (2nd Edition)|Stuart J. Russell|http://photo.goodreads.com/books/1167881696s/27543.jpg|1362]. While his hacker friends were indulging themselves breaking into other computers to see if it could be done, Diffie worked on software to prevent such intrusions. Then he read David Kahn's classic [b:The Codebreakers|17994|The Code Book The Science of Secrecy from Ancient Egypt to Quantum Cryptography|Simon Singh|http://photo.goodreads.com/books/1166855238s/17994.jpg|1031975] that revealed how much secret work was being done by the NSA (formerly known as No Such Agency). He realized an enormous amount of work was being done behind closed doors, and that offended his sense of propriety since privacy for individuals was important too. Encryption had become essential with the advent of the Internet.. Digital signatures, for example could be easily copied, as could digital documents, so how could they be made secure without slowing down transactions? In 1977, three MIT professors who had been intrigued by Diffie's work discovered the mechanism that would strike terror in the hearts of cryptanalysts (those who break codes). Using factoring of prime numbers as the focal point, they realized that a 129-digit product of two prime numbers would require millions of years to break by brute strength (computer analysis of all the possibilities), but that anyone who had a private key of one of the prime numbers could easily decode the message. Thus the key that performed the encryption could be made public -- indeed, the wider the dissemination the better. For a better explanation read the book. We’re pushing my envelope here.

The National Security Agency, better known as the NSA, an agency that in its early years did not even admit to its own existence, began a campaign to thwart the work of the mathematicians. Even after the Justice Department had ruled that the ITAR regulations (these prevented dissemination of even published papers) were unconstitutional, the agency was trying to use them to scare anyone working on novel forms of cryptography. In other words, in spite of their having sworn allegiance to the Constitution, the agency and its employees were operating in a manner that the legal arm of the government had said was clearly unconstitutional. Shades of Oliver North, who always thought he could be the sole interpreter of the Constitution.

The epitome of the governmental role in trying to thwart the proverbial horse from escaping the barn was the Clipper chip. This hardware device was designed to be placed in every device that might conceivably be used for communications, from computers to telephones. Initially proposed by the NSA with the concurrence of the FBI and National Institutes of Standards, the device would use an escrow key; that is, every time it was used a key would be sent to a government agency theoretically to be stored until such time as the government needed to get at the conversation. Unfortunately, the Clinton administration, techno-freaks though they professed to be, completely misread the mood of the country. After all, would you leave a key to your house at the police station so they could get in any time they wanted? The reaction from foreign countries was astonishment. They were supposed to give the U.S. government access to private business conversations, etc.? The hubris of it all.

The crowning blow, despite polls that showed 80% of the country being opposed to the Clipper chip, was when a consultant hired by the NSA to test the chip showed it could be broken. It took him 42 minutes after realizing that the checksum used to verify the key being sent to law enforcement was only sixteen bits and could be computationally broken by a home PC. That made it the subject of ridicule and it was doomed. Levy’s book is a real page-turner and a classic analysis of how of technology outpaces policy.

( )
  ecw0647 | Sep 30, 2013 |
nessuna recensione | aggiungi una recensione

» Aggiungi altri autori (2 potenziali)

Nome dell'autoreRuoloTipo di autoreOpera?Stato
Steven Levyautore primariotutte le edizionicalcolato
Resnick, NancyDesignerautore secondarioalcune edizioniconfermato

Appartiene alle Collane Editoriali

Devi effettuare l'accesso per contribuire alle Informazioni generali.
Per maggiori spiegazioni, vedi la pagina di aiuto delle informazioni generali.
Titolo canonico
Titolo originale
Titoli alternativi
Data della prima edizione
Personaggi
Dati dalle informazioni generali inglesi. Modifica per tradurlo nella tua lingua.
Luoghi significativi
Dati dalle informazioni generali inglesi. Modifica per tradurlo nella tua lingua.
Eventi significativi
Film correlati
Epigrafe
Dedica
Dati dalle informazioni generali inglesi. Modifica per tradurlo nella tua lingua.
To Teresa and Andrew
Incipit
Dati dalle informazioni generali inglesi. Modifica per tradurlo nella tua lingua.
Mary Fischer loathed Whitfield Diffie on sight.
Citazioni
Ultime parole
Dati dalle informazioni generali inglesi. Modifica per tradurlo nella tua lingua.
Nota di disambiguazione
Redattore editoriale
Elogi
Lingua originale
Dati dalle informazioni generali inglesi. Modifica per tradurlo nella tua lingua.
DDC/MDS Canonico
LCC canonico
If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy-the author who made "hackers" a household word-comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of "crypto rebels"-nerds and visionaries turned freedom fighters-teamed up with corporate interests to beat Big Brother and ensure our privacy on the Internet. Levy's history of one of the most controversial and important topics of the digital age sounds like the best futuristic fiction.

Non sono state trovate descrizioni di biblioteche

Descrizione del libro
Riassunto haiku

Discussioni correnti

Nessuno

Copertine popolari

Link rapidi

Voto

Media: (3.94)
0.5
1 1
1.5
2 5
2.5 1
3 23
3.5 6
4 59
4.5 8
5 29

Sei tu?

Diventa un autore di LibraryThing.

 

A proposito di | Contatto | LibraryThing.com | Privacy/Condizioni d'uso | Guida/FAQ | Blog | Negozio | APIs | TinyCat | Biblioteche di personaggi celebri | Recensori in anteprima | Informazioni generali | 204,475,050 libri! | Barra superiore: Sempre visibile