Cryptography

Reading

For the October 23, 2001 class:

The Code Book by Simon Singh, Chapter 6 (Alice and Bob Go Public)  and Chapter 7 (Pretty Good Privacy).

Summary

Historically, the ability of two parties to communicate securely with each other has rested on their possession of a shared secret. Whitfield Diffie and Martin Hellman created a protocol by which two strangers (who do not share any prior knowledge) could communicate with each other, safe from the threat of eavesdropping. With Ralph Merkel, they went on to create the notion of an asymmetric cipher, where a different key was used to lock a message from the one that was used to unlock it. Soon thereafter, Ron Rivest, Adi Shamir and Len Adelman produced the first realization of the latter abstraction. A little earlier, James Ellis and Clifford Cocks had made similar discoveries which remained classified by the British government until recently.

Cryptographers and cryptanalysts are in a perpetual race to erect and bring down walls of secrecy, respectively. Cryptographers create new ciphers that are resistant to techniques that cryptanalysts invent, while the latter strive to find irregularities in the scrambling processes that the former invent. Law enforcement agencies that can not overcome cryptography by technical means attempt to limit its use to enable them to monitor suspicious communication. Simultaneously, there has been an increased need for cryptography to maintain otherwise eroding privacy in an era of widespread use of public networks. The latter led political activist Phil Zimmerman to release PGP (Pretty Good Privacy), a program that enables strong encryption of computer data. The U.S. government's prosecution of Zimmerman catalyzed judicial examination of the tension between the needs/rights of law enforcement and those of the individual.

Questions