← Back to Concept Index

cryptanalysis

The practice of attempting to decode encrypted messages without the key, contrasted with Diffie's preference for creating secure codes.

4 chapters across 3 books

Crypto (2001)Steven Levy

Chapter 5

This chapter introduces Whitfield Diffie, focusing on his early life, personality, and initial exposure to cryptography. It details his complex relationship with Mary Fischer, his fascination with secret codes sparked by a fifth-grade teacher, and his early intellectual pursuits that set the stage for his later groundbreaking work in public key cryptography. The narrative highlights Diffie's contrarian nature, his deep interest in mathematics as a pursuit of absolute truth, and the formative influences that shaped his future contributions to computer security.

Artificial Life: How Computers Are Transforming Our Understanding of Evolution and the Future of Life (2001)Steven Levy

Chapter 6

This chapter introduces Whitfield Diffie, a pioneering figure in cryptography, focusing on his early life, personality, and formative experiences that shaped his revolutionary work in public key cryptography. It details his initial encounter with Mary Fischer, his fascination with cryptography sparked by a fifth-grade teacher, and his early intellectual pursuits that combined an interest in secrecy, mathematics, and independent thinking. The chapter also contextualizes Diffie's background, family influences, and the historical development of classical cryptographic systems that framed his later innovations.

Chapter 10

This chapter chronicles the early 1980s emergence of an independent academic cryptography community that challenged the NSA's exclusive control over cryptographic research. Key events include the founding of the annual Crypto conferences, spearheaded by David Chaum, and the public cryptanalysis of the Merkle knapsack cryptosystem by Len Adleman and others, which symbolized the growing power and influence of independent cryptographers. The chapter also highlights the tension between government secrecy and academic openness, as well as the uncertain commercial prospects for cryptographic technologies despite their technical breakthroughs.

Ninefox Gambit (2016)Yoon Ha Lee

Chapter 11

In this chapter, General Cheris Jedao commands a formation against a heretical enemy employing a kaleidoscope swarm and fungal weaponry, revealing the complexities of formation tactics and the dangers posed by unorthodox warfare. Despite internal dissent and the reckless actions of Commander Vidona Diaiya, Jedao's forces manage to identify and target the original enemy moths, forcing a retreat and receiving a cryptic challenge from the Fortress of Scattered Needles. The chapter concludes with preparations to adapt to the heretical calendar and concerns about the stability of their advance.