⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 file-upload-example-windows.txt

📁 C/C++语言的CGI接口库
💻 TXT
字号:
-----------------------------7d2aa1c302a4
Content-Disposition: form-data; name="uploaded_file"; filename="C:\Documents and Settings\jmcatche\Desktop\msgs\crypto-review.txt"
Content-Type: text/plain

Crypto
Author: Steven Levy
Publisher:  Viking 
ISBN:  0-670-85950-6
Rating: Excellent
Reviewer: topeka <topeka@catchen.org>

Synopsis: This January, Steven Levy will make the next installment in 
his history of the technological events  of the past quarter century.  
<b>Crypto: When the Code Rebels Beat the Government</b>  is an 
excellent account of the events that delivered cryptography out of the 
hands of governments and the NSA and into the hands of the people 
who made it happen.

<p>
The first time I heard the term "elegant" applied to a technical problem 
was a bit of a revelation for me.  Until then, elegance, to me, was a 
visual quality that could only be achieved by painters and poets.  
When I began to see the elegance in solutions to technical and 
mathematical problems, I was hooked into a world of intellectual 
curiosity.  Cryptography immediately filled the mold of a highly 
complex and technical problem with a beautiful and elegant solution 
when it was first explained to me several years ago.  The idea clicked 
again when I read Raymond's <a 
href="http://www.tuxedo.org/~esr/writings/cathedral-bazaar/"> The 
Cathedral and the Bazaar</a> and equated that elegance to 
"scratching a particular itch".  This intellectual curiosity seems to 
drive the open source community.
</p>
<p> 
However, in 1967, when James Ellis of the secret British agency, 
GCHQ, first came up with the idea of public key cryptography, his 
theory was buried.  Until then, solutions to cryptographic problems 
were a dirty process. If it was easy to create a cipher, than it was just 
as easy to break it.  As such, Ellis's breakthrough was simply too 
pretty to be trusted and as a result, it lay locked away until 1997.  <a 
href="http://www.echonyc.com/~steven">Steven Levy's</a> new 
book, Crypto is the story of the individuals who transformed 
cryptography from a dirty art, which only the most elite governments 
dabbled in, to an elegant mathematical solution available to the public 
in hundreds of different forms.  It was all done by a community of 
individuals who preached openness and sought out elegant solutions to 
tough, technical problems.
</p>
<p> 
Levy starts out his story in the same place as he started with an earlier 
famous work, at the Massachusetts Institute of Technology.  He 
narrates the story of Whitfield Diffie, the co-creator of public key 
cryptography.  Starting in 1969 as Diffie sought shelter from the 
Vietnam war working for a defense contractor, Levy discusses Diffie's 
transformation from examining ideas about cryptography as merely a 
hobby, to an all out obsession.   Diffie is transformed from a man 
thinking about cryptography on the weekends to a man criss-crossing 
the country in one run-down Datsun after another, searching for any 
and every piece of information about cryptography. Diffie would not 
broach the wall of cryptography until he was pointed to another 
cryptography source in California who seemed to be investigating the 
same concepts as Diffie.  Levy chronicles the fateful partnership that 
occurred with Marty Hellman and the subsequent invention of public 
key cryptography, at least its theory.
</p>
<p> 
During this time period, there were few works published on the subject 
of cryptography.  In fact, only government agents and a few privileged 
defense contractors were able to expend meaningful resources on 
crypto research.  It seems that while Levy's work is a story of the 
people who waged a war to bring crypto to the public, it is also the 
story of that wars' enemy, the National Security Agency.  The 
cryptography bureaucracy, gaining most of its resources during the 
Second World War, had built quite a palace around anything that 
involved codes.  In the years to come, the NSA would fiercely defend 
its position of strength.  From its early attempts to classify David 
Kahn's famous work, <I>The Codebeakers</I>, to its involvement in 
the creation of the Digital Encryption Standard and its invention of the 
Clipper Chip. As <I>Crypto</I> defines it, the spooks were able to 
keep their lock on cryptography by invoking a mentality of "if only 
you knew what I know..." in classified briefings to politicians and 
contract negotiations with defense contractors like IBM.  What the 
NSA never expected, was for anyone to try and find out what it was 
that they knew.  With the publishing of the Diffie-Hellman paper, 
"New Directions in Cryptography," one of the NSA's most viable 
opponents would begin their work where Diffie and Hellman's 
theories left off, implementation.
</p>
<p> 
Ron Rivest, Adi Shamir and Leonard Adleman, through a four-month 
period of intense brainstorming, would eventually implement and 
patent the Diffie-Hellman concept of public key cryptography while 
working as faculty at MIT.  As Levy chronicles it, the algorithm, 
which would become popularly known as RSA, was named for the 
order in which each mathematician gave to the project.  Rivest, who 
spearheaded the search for the implementation was listed first and 
Adelman, who merely poked holes in Rivest and Shamir's proposals, 
had to be convinced that he had even contributed enough to the project 
to be listed on the paper.  Until this point, the description of 
cryptographic algorithms in scientific texts had always been done 
using letters of the alphabet to depict members in a cryptographic 
exchange.  The creators of RSA introduced the now famous 
cryptographic characters, Alice, Bob and the unruly Eve, to describe 
their new breed of algorithms.  Levy is able to highlight the mentality 
of the three mathematicians, some of which at first, thought the 
problem was nothing more than a clever puzzle and too grounded in 
the real world to be successfully dealt with by mathematicians.   He 
shows their transformation to the church of cryptography, as the 
elegance of the new algorithms would prove as beautiful as the 
theorems of Gauss and Euclid. 
</p>
<p> 
The story continues with RSA Data Security, the vehicle Rivest would 
use to commercialize his algorithm.  To talk about RSA Data Security 
is to talk about patent use.  Both the Diffie-Hellman algorithm, as well 
as RSA, were actually patented by Stanford University and MIT, 
respectively.  When the patents were granted, those Universities then 
had the option to either free the patents or restrict them.  As history has 
painfully shown, they did not choose to free them.  RSA Data security 
was built on this decision -- an MIT patent.  It was sometimes difficult 
to read this section of the book with the same exuberance that Levy 
writes about it.  Nonetheless, it is a reminder of the state of our 
intellectual property laws today in the United States.
</p>
<p> 
Levy's narration eventually leaves the story of RSA to tell that of Phil 
Zimmerman, someone who could rightly be called a crypto-anarchist.  
Once again we are treated to an in depth discussion of the motivation 
that created <a href="http://www.pgpi.org/">Pretty Good Privacy</a>.  
Levy contrasts the use of legal patents by RSA Data Security to bring 
encryption to the masses, to the complete ignorance of them by 
Zimmerman in his creation of PGP to achieve the same goal.  
</p>
<p> 
Finally, in my favorite section of the book, Levy discusses the 
controversy that surrounded a device known as the Clipper Chip.  It 
was originally invented by the NSA as a complete key-escrow system, 
named the Capstone Chip.  Later, as AT&T attempted to market the 
first encrypted telephone device, the Capstone chip became the Clipper 
Chip as the FBI and other Executive branch officers rushed to 
implement a brain-dead subset of the original system before the AT&T 
device made it to market.  An entirely amusing fiasco, Levy lays the 
entire story out from beginning to end. 
</p>
<p> 
Lastly, includes an epilogue telling the story of the British agents at 
GHCQ, who beat Whitfield-Diffie and RSA 

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -