← Back to Concept Index

public-key-cryptography

The chapter foreshadows Diffie's future role as the co-discoverer of public key cryptography, a revolutionary method for securing digital communication.

21 chapters across 2 books

Crypto (2001)Steven Levy

Chapter 5

This chapter introduces Whitfield Diffie, focusing on his early life, personality, and initial exposure to cryptography. It details his complex relationship with Mary Fischer, his fascination with secret codes sparked by a fifth-grade teacher, and his early intellectual pursuits that set the stage for his later groundbreaking work in public key cryptography. The narrative highlights Diffie's contrarian nature, his deep interest in mathematics as a pursuit of absolute truth, and the formative influences that shaped his future contributions to computer security.

Chapter 7

This chapter chronicles Whit Diffie's intellectual journey toward the invention of public key cryptography, highlighting his struggles with existing cryptographic paradigms and his eventual breakthrough in conceptualizing a key pair system that separates encryption and decryption keys. It details the conceptual challenges of trapdoors in cryptography, Diffie's personal doubts and perseverance, and the revolutionary idea that a public key could be openly distributed while its private counterpart remained secret, fundamentally changing secure communication.

Chapter 8

This chapter traces Ron Rivest's early academic and personal background leading up to his pivotal engagement with the Diffie-Hellman paper on public key cryptography. It details his transition from theoretical computer science and AI to a focused quest for practical cryptographic algorithms, culminating in the formation of a collaborative trio with Adi Shamir and Leonard Adleman at MIT. The chapter highlights the intellectual and social dynamics that fueled their search for one-way functions to realize a workable public key cryptosystem.

Chapter 9

This chapter chronicles the early 1980s emergence of an independent cryptographic research community that challenged the NSA's monopoly on cryptanalysis knowledge. It highlights the formation of regular 'Crypto' conferences led by David Chaum, the public cryptanalysis breakthroughs such as the destruction of the Merkle knapsack cryptosystem, and the growing tension between government agencies and academic cryptographers. The chapter also touches on the nascent attempts to commercialize cryptographic technologies, particularly through the RSA algorithm and its creators' struggles.

Chapter 11

This chapter traces Phil Zimmermann's early life and evolving passion for cryptography, from childhood fascination with codes to his discovery of public key cryptography and political activism. It highlights his technical experiments, political awakening, and eventual motivation to create accessible encryption software to protect privacy against government surveillance. The narrative situates Zimmermann's personal history alongside the broader context of Cold War-era politics and emerging computer technologies.

Chapter 14

This epilogue chapter recounts the overlooked origins of public key cryptography, focusing on James Ellis, a British GCHQ scientist who, in 1969, conceived the idea of 'Non-Secret Encryption' that allowed secure communication without prior key exchange. Ellis adapted principles from a classified Bell Telephone project to propose a system where the recipient participates in encryption, fundamentally challenging existing cryptographic assumptions and paving the way for secure communications on a vast scale. Despite his groundbreaking insight, Ellis remained unrecognized for decades due to the secretive nature of his work and his eccentric persona.

Chapter 16

This chapter, titled 'The Loner,' compiles various references and sources related to classical cryptography, the National Security Agency (NSA), and key figures in cryptographic history such as Whit Diffie and William F. Friedman. It highlights the background materials and authoritative texts that inform the development and understanding of public key cryptography, including detailed descriptions of cryptographic systems, the NSA's security measures, and seminal works by Claude Shannon and others. The chapter serves as a foundational resource guide for understanding the historical and technical context of cryptography.

Chapter 18

This chapter outlines the foundational works and key figures in the development of public key cryptography, highlighting seminal papers by Diffie, Hellman, and Merkle. It references both historical recounts and technical explanations that illuminate the evolution and implementation of cryptographic algorithms. The chapter situates these contributions within the broader discourse on secure communications over insecure channels.

Chapter 19

This chapter provides a detailed chronology and reference guide to key events, publications, and controversies in the development of cryptography during the 1970s, highlighting the tension between government secrecy and academic openness. It documents foundational cryptographic works, government surveillance legislation, and the NSA's attempts to control cryptographic research and publication, alongside the responses from scientists and legal experts advocating for transparency and academic freedom.

Chapter 23

This chapter provides a detailed account of the Clipper Chip controversy, drawing from interviews, declassified documents, and contemporary journalism. It covers the technical aspects of the Clipper and Capstone encryption systems, the political and legal debates surrounding government key escrow, and the public and expert reactions to the perceived privacy and security implications. The chapter also references key figures, hearings, and critical analyses that shaped the discourse on encryption policy in the early 1990s.

Chapter 27

This chapter provides a comprehensive glossary of key terms and concepts related to cryptography and cryptanalysis, explaining foundational cryptosystems, encryption methods, and government involvement in encryption technology. It covers both conventional and public key cryptography, highlighting important algorithms like RSA and Diffie-Hellman, as well as government initiatives such as the Capstone and Clipper chips. The glossary also clarifies technical terms such as ciphertext, key escrow, and digital signatures, offering a foundational understanding of the cryptographic landscape.

Chapter 28

This chapter appears to be an extensive index or reference list from Steven Levy's book "Crypto," cataloging key figures, concepts, technologies, legislation, and organizations related to cryptography and digital security. It covers a wide range of topics including encryption standards, cryptographic algorithms, government policies, privacy issues, and influential individuals in the field. The chapter serves as a comprehensive resource for understanding the breadth and depth of the cryptography landscape as presented in the book.

Artificial Life: How Computers Are Transforming Our Understanding of Evolution and the Future of Life (2001)Steven Levy

Chapter 6

This chapter introduces Whitfield Diffie, a pioneering figure in cryptography, focusing on his early life, personality, and formative experiences that shaped his revolutionary work in public key cryptography. It details his initial encounter with Mary Fischer, his fascination with cryptography sparked by a fifth-grade teacher, and his early intellectual pursuits that combined an interest in secrecy, mathematics, and independent thinking. The chapter also contextualizes Diffie's background, family influences, and the historical development of classical cryptographic systems that framed his later innovations.

Chapter 8

This chapter details Whit Diffie's intellectual journey and breakthrough in cryptography, culminating in the invention of public key cryptography. It explores the challenges of secure communication over insecure channels, the concept of trapdoors in cryptographic systems, and Diffie's insight that a key pair—one public and one private—could solve the problem of secure key distribution and authentication. This innovation fundamentally transformed cryptography by enabling secure communication without prior secret key exchange.

Chapter 9

This chapter traces Ron Rivest's early academic journey and his pivotal encounter with the Diffie-Hellman paper on public key cryptography, which inspired him to pursue the practical implementation of cryptographic algorithms. Rivest, together with colleagues Adi Shamir and Leonard Adleman, embarked on a collaborative quest to find robust one-way functions to realize a secure public key cryptosystem, blending theoretical mathematics with real-world applications. Their work laid the foundation for modern cryptography and the future of secure digital communication.

Chapter 10

This chapter chronicles the early 1980s emergence of an independent academic cryptography community that challenged the NSA's exclusive control over cryptographic research. Key events include the founding of the annual Crypto conferences, spearheaded by David Chaum, and the public cryptanalysis of the Merkle knapsack cryptosystem by Len Adleman and others, which symbolized the growing power and influence of independent cryptographers. The chapter also highlights the tension between government secrecy and academic openness, as well as the uncertain commercial prospects for cryptographic technologies despite their technical breakthroughs.

Chapter 12

This chapter chronicles Phil Zimmermann's early fascination with cryptography, from childhood puzzles to his college programming experiments, culminating in his political awakening and determination to create accessible public key encryption software. It highlights his personal background, technical challenges, and the political context of government surveillance and nuclear activism that motivated his work. The narrative also introduces Charlie Merritt, whose microcomputer RSA implementation inspired Zimmermann to pursue his own encryption program for the people.

Chapter 15

This chapter recounts the early, secretive development of public key cryptography by James Ellis at GCHQ, who independently conceived the idea of 'non-secret encryption' that allowed secure communication without prior key exchange. Ellis's work, inspired by a forgotten Bell Telephone analog project, challenged prevailing cryptographic assumptions and laid foundational concepts later popularized by Diffie, Hellman, and Merkle. Despite his breakthrough, Ellis remained unrecognized for decades due to the classified nature of his work and his eccentric personality.

Chapter 16

This chapter provides extensive notes and references related to the history and development of cryptography, particularly focusing on public key cryptography and the Data Encryption Standard (DES). It draws from personal interviews, government and corporate documents, and seminal academic papers to trace the technical, political, and cultural evolution of cryptographic systems from classical methods to modern innovations. The chapter also highlights the interplay between cryptographic research, government secrecy, and the emerging crypto-anarchist movement.

Chapter 18

This chapter provides a comprehensive glossary of cryptographic terms and technologies relevant to computer security and encryption. It explains foundational concepts such as encryption, cryptanalysis, and key management, as well as specific cryptosystems like DES, RSA, and PGP. The glossary also covers government-related encryption technologies and controversies, including key escrow systems like the Capstone and Clipper chips.

Chapter 19

This chapter appears to be an extensive index or reference list related to cryptography, covering key figures, technologies, algorithms, organizations, and legislative aspects relevant to the field. It catalogs numerous individuals, encryption standards, cryptographic methods, and policy issues, reflecting the complexity and breadth of cryptography's role in computer security and digital privacy. The chapter underscores the interplay between technological innovation, governmental regulation, and social implications within the cryptographic landscape.