Professional Documents
Culture Documents
The increasing use of digitized information and the rise of the Internet has
made cryptography a daily tool for millions of people today. People use
cryptography when they purchase an item via the World Wide Web, when
they call on a European (GSM) cell phone, or when they make a
withdrawal from a bank machine. Cryptography provides confidentiality
(assurance that an eavesdropper will not be able to understand the
communication), authenticity (proof of the message's origin), and
integrity (guarantee that the message has not been tampered with in
transit). Modern communications— phone, fax, or e-mail—are frequently
in digital form (0's and 1's), and the unencrypted string of bits, or
plaintext, is transformed into ciphertext by an encryption algorithm.
There are two parts to any encryption system: the algorithm for doing the
transformation and a secret piece of information that specifies the
particular transformation (called the key). (In the Spartan system
described earlier, the key is the width of the wooden staff. If someone
were to intercept an encrypted message, unless the interceptor had a
staff of the correct width, all the spy would see would be a confused
jumble of letters.) Each user has a personal key. This private chunk of
information enables many people to use the same cryptosystem, yet each
individual's communications are confidential.
Public-Key Cryptography
Public-key cryptography operates on the seemingly paradoxical idea that
one can publish the encryption algorithm and the key, and yet decryption
remains computationally unfeasible for anyone but the correct recipient
of the message. The concept, invented by Whitfield Diffie and Martin
Hellman in 1975, relies on the existence of mathematical functions that
are fast to compute but which take an extremely long time to invert.
Multiplication and factoring are one such pair. Using processors available
in 2001, the product of two 200-digit primes can be determined in under
a second. Even with the world's fastest computers in 2002, factoring a
400-digit integer is estimated to take trillions of years. The well-known
public-key algorithm RSA, named after its inventors Ronald Rivest, Adi
Shamir, and Leonard Adleman, relies on the difficulty of factoring for its
security.
Although cryptography has been studied and used for thousands of years
by mathematicians, politicians, linguists, and lovers, it became the
province of national security in the half century following World War I.
And while humans have always sought to keep information from prying
eyes, the Information Age has intensified that need. Despite controversy,
cryptography has returned from being a tool used solely by governments
to one that is used by ordinary people, everyday.
Susan Landau
Bibliography
Diffie, Whitfield, and Susan Landau. Privacy on the Line: The Politics of
Wiretapping and Encryption.Cambridge, MA: MIT Press, 1998.
Kahn, David. The Codebreakers: The Story of Secret Writing. New York:
Macmillan Company, 1967.
Schneier, Bruce. Applied Cryptography. New York: John Wiley and Sons,
1996.
Sinkov, Abraham. Elementary Cryptanalysis: A Mathematical
Approach. Washington, DC: Mathematical Association of America, New
Mathematical Library, 1966.