Wednesday, June 03, 2015
Search
  
Most Popular
Tech Views
General Computing
WEB Reviews
Seagate Enterprise Capacity 3.5 V.3 4TB SAS 6Gb/s HDD Review
OCZ Vector 256GB SSD Review @ Custom PC Review
Gigabyte F2A85XM-D3H
NZXT Phantom 630
Auvio Bluetooth Portable Speaker Review
Corsair H90 CPU Cooler Review
BIOSTAR Hi-Fi Z77X (Intel Z77) Motherboard Review
Noctua NH-L9i Cooler Review on Technic3D
Breaking News
Microsoft Showcases new Windows 10 Devices At Computex 2015
Corning's new Eagle XG Slim glass In Just 0.4mm Thick
Plextor At Computex 2015
Samsung Mobile Payment System Coming In September
Toshiba Partners with Microsoft to Deliver New Internet of Things Solutions
Kingston Releases USB Type-C Flash Drive
AMD Targets Notebooks and All-in-Ones With 6th Generation A-Series Processor
Computex: Micron Announces New High-Capacity, 16nm Triple-Level-Cell NAND
Home > Tech Views > General Computing

Monday, May 16, 2005
Fighting Big Brother

2. Page 2

Let’s take things from the beginning…

There is one and only basic feature in digital communications carried out as they are, either through new generation telephone apparatuses, or through mobiles, or through computer networks: what they practically convey is numbers. Anything we key on a computer, or utter on the phone, is turned into digits, carried through the line and decoded when reaching the receiver. Yet, it is possible that these numbers are “jumbled” in the source of transmission, on the grounds of an equation called the algorithm, to be rearranged in their proper order again when reaching their destination with the help of the same equation. If, in the meantime, one overrides the transmission in question and is not in possession of the algorithm, is by no means capable of comprehending the message.

The technology linked to ciphering as well as deciphering messages is rather old but the high cost involved in it has made a state monopoly out of it. With the discovery of the Personal Computer and the Digital Telephone Device the process has been simplified indeed. Now anyone can encode their messages providing they are in possession of the appropriate program. This way the state lost both its privilege to the monopoly of cryptography and the ability to spy upon the just and the unjust at the same time…

This “danger” became visible at an early stage by the USA secret services. Since 1979, Bobby Inman, head of the NSA-National Security Agency (an organization whose existence was unknown to everyone prior to 1966)-had been persisting in his department assuming control over all cryptography programs, congruent with the one over nuclear weapons, handed over to the Pentagon! Yet, his dictates had not been heard till it was too late. The science of cryptography was breaking away from academic institutions and, mainly through the Internet, spreading to the public.

In 1990 the American government tried to pass a bill against crime. One of its provisions allowed for the codes connected with products of cryptography to be readable by the state authorities. General clamor broke out, but that was not enough for the bill to be revoked, on the grounds of “national interest”…




Get RSS feed Easy Print E-Mail this Message


 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2015 - All rights reserved -
Privacy policy - Contact Us .