Monday, December 11, 2017
Most Popular
Tech Views
General Computing
WEB Reviews
Seagate Enterprise Capacity 3.5 V.3 4TB SAS 6Gb/s HDD Review
OCZ Vector 256GB SSD Review @ Custom PC Review
Gigabyte F2A85XM-D3H
NZXT Phantom 630
Auvio Bluetooth Portable Speaker Review
Corsair H90 CPU Cooler Review
BIOSTAR Hi-Fi Z77X (Intel Z77) Motherboard Review
Noctua NH-L9i Cooler Review on Technic3D
Breaking News
LG Tests LTE-based Safety Technology for Connected, Self-driving Cars
Apple Said To Buy Shazam
Intel Uses Cobalt Interconnect for 10nm, Global Foundries Detail EUV Lithography for 7nm
LG Display Starts OLED Light Panel Production
Toshiba Moving Closer to Deal With Western Digital
YouTube Said to Launch Music Subscription Service
NVIDIA Says New TITAN V GPUs Transform the PC into AI Supercomputer
Toshiba Launches First 14TB HDD with Conventional Magnetic Recording
Home > Tech Views > General Computing

Monday, May 16, 2005
Fighting Big Brother

2. Page 2

Let’s take things from the beginning…

There is one and only basic feature in digital communications carried out as they are, either through new generation telephone apparatuses, or through mobiles, or through computer networks: what they practically convey is numbers. Anything we key on a computer, or utter on the phone, is turned into digits, carried through the line and decoded when reaching the receiver. Yet, it is possible that these numbers are “jumbled” in the source of transmission, on the grounds of an equation called the algorithm, to be rearranged in their proper order again when reaching their destination with the help of the same equation. If, in the meantime, one overrides the transmission in question and is not in possession of the algorithm, is by no means capable of comprehending the message.

The technology linked to ciphering as well as deciphering messages is rather old but the high cost involved in it has made a state monopoly out of it. With the discovery of the Personal Computer and the Digital Telephone Device the process has been simplified indeed. Now anyone can encode their messages providing they are in possession of the appropriate program. This way the state lost both its privilege to the monopoly of cryptography and the ability to spy upon the just and the unjust at the same time…

This “danger” became visible at an early stage by the USA secret services. Since 1979, Bobby Inman, head of the NSA-National Security Agency (an organization whose existence was unknown to everyone prior to 1966)-had been persisting in his department assuming control over all cryptography programs, congruent with the one over nuclear weapons, handed over to the Pentagon! Yet, his dictates had not been heard till it was too late. The science of cryptography was breaking away from academic institutions and, mainly through the Internet, spreading to the public.

In 1990 the American government tried to pass a bill against crime. One of its provisions allowed for the codes connected with products of cryptography to be readable by the state authorities. General clamor broke out, but that was not enough for the bill to be revoked, on the grounds of “national interest”…

Get RSS feed Easy Print E-Mail this Message

Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2017 - All rights reserved -
Privacy policy - Contact Us .