Matt Curtin: Brute Force: Cracking the Data Encryption Standard (2005)

22 August 2011, dusan

In the 1960s, it became increasingly clear that more and more information was going to be stored on computers, not on pieces of paper. With these changes in technology and the ways it was used came a need to protect both the systems and the information. For the next ten years, encryption systems of varying strengths were developed, but none proved to be rigorous enough. In 1973, the NBS put out an open call for a new, stronger encryption system that would become the new federal standard. Several years later, IBM responded with a system called Lucifer that came to simply be known as DES (data encryption standard).

The strength of an encryption system is best measured by the attacks it is able to withstand, and because DES was the federal standard, many tried to test its limits. (It should also be noted that a number of cryptographers and computer scientists told the NSA that DES was not nearly strong enough and would be easily hacked.) Rogue hackers, usually out to steal as much information as possible, tried to break DES. A number of “white hat” hackers also tested the system and reported on their successes. Still others attacked DES because they believed it had outlived its effectiveness and was becoming increasingly vulnerable. The sum total of these efforts to use all of the possible keys to break DES over time made for a brute force attack.

In 1996, the supposedly uncrackable DES was broken. In this captivating and intriguing book, Matt Curtin charts DES’s rise and fall and chronicles the efforts of those who were determined to master it.

Publisher Springer, 2005
Copernicus Series
ISBN 0387201092, 9780387201092
291 pages

wikipedia
publisher
google books

PDF

Cypherpunks mailing list archive (1992-1998)

12 July 2011, dusan

Cypherpunks was an active list with technical discussion ranging over mathematics, cryptography, and computer science. It had extensive discussions of the public policy issues related to cryptography and on the politics and philosophy of concepts such as anonymity, pseudonyms, reputation, and privacy.

The list was started in 1992, and at its peak in 1997 had well over a thousand subscribers, including John Gilmore (EFF co-founder), Timothy May (author of Crypto Anarchist Manifesto), Eric Hughes (A Cypherpunk’s Manifesto), Phil Zimmermann (PGP), Hal Finney (RPOW), Bram Cohen (BitTorrent), Adam Back (Hashcash), Julian Assange (WikiLeaks), John Young (Cryptome), or Rop Gonggrijp (Xs4all).

wikipedia

ZIP (from Cryptome.org)

Peter Ludlow (ed.): Crypto Anarchy, Cyberstates, and Pirate Utopias (2001)

1 March 2009, pht

In Crypto Anarchy, Cyberstates, and Pirate Utopias, Peter Ludlow extends the approach he used so successfully in High Noon on the Electronic Frontier, offering a collection of writings that reflects the eclectic nature of the online world, as well as its tremendous energy and creativity. This time the subject is the emergence of governance structures within online communities and the visions of political sovereignty shaping some of those communities. Ludlow virtual communities as laboratories for conducting experiments in the construction of new societies and governance structures. While many online experiments will fail, Ludlow argues that given the synergy of the online world, new and superior governance structures may emerge. Indeed, utopian visions are not out of place, provided that we understand the new utopias to be fleeting localized “islands in the Net” and not permanent institutions.

The book is organized in five sections. The first section considers the sovereignty of the Internet. The second section asks how widespread access to resources such as Pretty Good Privacy and anonymous remailers allows the possibility of “Crypto Anarchy”—essentially carving out space for activities that lie outside the purview of nation states and other traditional powers. The third section shows how the growth of e-commerce is raising questions of legal jurisdiction and taxation for which the geographic boundaries of nation-states are obsolete. The fourth section looks at specific experimental governance structures evolved by online communities. The fifth section considers utopian and anti-utopian visions for cyberspace.

Contributors: Richard Barbrook, John Perry Barlow, William E. Baugh Jr., David S. Bennahum, Hakim Bey, David Brin, Andy Cameron, Dorothy E. Denning, Mark Dery, Kevin Doyle, Duncan Frissell, Eric Hughes, Karrie Jacobs, David Johnson, Peter Ludlow, Timothy C. May, Jennifer L. Mnookin, Nathan Newman, David G. Post, Jedediah S. Purdy, Charles J. Stivale.

Published by MIT Press, 2001
ISBN 0262621517, 9780262621519
485 pages

publisher
google books

PDF (updated on 2012-8-5)