Skip to main content Accessibility help
×
Hostname: page-component-7479d7b7d-fwgfc Total loading time: 0 Render date: 2024-07-10T23:28:52.829Z Has data issue: false hasContentIssue false

PRIVACY

Published online by Cambridge University Press:  05 July 2015

Marta García-Matos
Affiliation:
Institut de Ciències Fotòniques (ICFO)
Lluís Torner
Affiliation:
Institut de Ciències Fotòniques (ICFO)
Get access

Summary

Beyond approximately 10 years into the future, the general feeling among ECRYPT partners is that recommendations [on digital information security] made today should be assigned a rather small confidence level.

2008 ECRYPT European Network of Excellence in Cryptology final report.

An old saying, very popular among cryptographers, states that two people can share a secret only if one of them is dead; there is nothing that makes a piece of information more compelling than keeping it secret.

The need for private communications might seem today as momentous as ever, with an increasing number of our relevant activities digitalized and uploaded to the cloud. But keeping secrets undercover has always been of paramount importance. The wealth and fate of whole projects and enterprises have often depended on the competence of skillful agents in defending confidential information, even with their lives.

Cryptography is indeed as ancient as the civilized world. Its history is frequently pictured as an endless fight between the information hiders and the information seekers: the codemakers and the code-breakers. Each battle, eventually won by the increasing ingenuity of code-breakers, which forces in turn the springing up of yet craftier code-makers, stimulates the rise and expansion of several scientific disciplines. Some of the finest minds of all ages have been fascinated by the challenge of deciphering codes: Al-Kindi in the Middle Ages, Charles Babbage in the nineteenth century, and Alan Turing in the twentieth century, were prominent code-breakers and made fundamental advances in cryptanalysis. A priceless by-product of all these advances was a deep progress in other areas such as linguistics, statistical analysis, and computer science.

Right now, at the forefront of code-making, stand Ron Rivest, Adi Shamir, and Leonard Adleman. They are the inventors of the RSA cryptosystem that maintains security on the Internet. The system, based on the practical difficulty of factoring the product of two big prime numbers, has brought higher mathematics into the cipher arena, where we now find elements of number theory, modular arithmetic, or elliptic curves.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2015

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Brassard, G. (2006) Brief history of quantum cryptography: a personal perspective. Proceedings of IEEE Information Theory Workshop on Theory and Practice in Information Theoretic Security, Awaji Island, Japan. Available online at http://www.iro.umontreal.ca/˜brassardGoogle Scholar
Cox, B., Forshaw, J. (2011) Everything That Can Happen Does Happen. Penguin Books, LondonGoogle Scholar
Gardner, M. (1972) Codes, Ciphers and Secret Writing. Simon & Schuster, New YorkGoogle Scholar
Kahn, D. (1996) The Code Breakers – The Comprehensive Story of Secret Communication from Ancient Times to the Internet. Scribner, New YorkGoogle Scholar
Singh, S. (1999) The Code Book. Doubleday, New YorkGoogle Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×