Advertisement

Cryptographic Media

  • Quinn DuPont
Living reference work entry

Abstract

Cryptographic technologies have become an essential and even ubiquitous component of online infrastructure, yet they are rarely acknowledged outside of technical literatures. This chapter contributes questions about the impact of these technologies on daily life, and suggests five threads for future analysis: encryption, obfuscation and hiding, code, language, and epistemology. While each has a technical side, in this chapter they are presented at the intersections with society, politics, and culture. In many cases, revitalizing these intersections requires looking for historical examples, when for instance, prior to the twentieth century, the technologies and our understanding of them were more fluid and integrated with cultural and scientific pursuits. The common dimension running through this history and its revitalization is a conception of cryptography and its cognate technologies as “media”.

Keywords

Cryptography Code Encryption Media theory Internet infrastructure Digital culture 

References

  1. Berry DM (2011) The philosophy of software: code and mediation in the digital age. Palgrave Macmillan, New YorkCrossRefGoogle Scholar
  2. Brunton F (2014) Kleptography Radical Philosophy:2–6Google Scholar
  3. Brunton F, Nissenbaum H (2015) Obfuscation: a User’s guide for privacy and protest. MIT PressGoogle Scholar
  4. Chun WHK (2008) Control and freedom: power and paranoia in the age of Fiber optics. MIT Press, Cambridge, MAGoogle Scholar
  5. Churchhouse RF (2002) Codes and ciphers: Julius Caesar, the enigma, and the internet. Cambridge University Press, CambridgeGoogle Scholar
  6. Cocks CC (1973) A Note on “Non-Secret Encryption”. https://www.gchq.gov.uk/notenon-secret-encryption
  7. Cole E (2003) Hiding in plain sight: steganography and the art of covert communication. Wiley, IndianapolisGoogle Scholar
  8. Cox G, McLean A, Berardi F “Bifo” (2012) Speaking code: coding as aesthetic and political expression. MIT Press, Cambridge, MAGoogle Scholar
  9. Cramer F (2005) Words made flesh: code, culture, imagination. Piet Zwart Institute, RotterdamGoogle Scholar
  10. Diffie W (1988) First ten years of public-key cryptography. Proc IEEE 76:560–577CrossRefGoogle Scholar
  11. Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Trans Inf Theory 22:644–654CrossRefGoogle Scholar
  12. Drucker J (1995) The alphabetic labyrinth: the letters in history and imagination. Thames and Hudson, New YorkGoogle Scholar
  13. DuPont Q (2018a) The cryptological origins of machine translation, from al-Kindi to Weaver. Amodern 8, pp 1–20. http://amodern.net/article/cryptological-origins-machine-translation/
  14. DuPont Q (2018b) The printing press and cryptography: Alberti and the Dawn of a notational epoch. In: Ellison K, Kim S (eds) A material history of medieval and early modern ciphers: cryptography and the history of literacy. Routledge, New York, pp 95–117Google Scholar
  15. DuPont Q (2017b) Blockchain identities: notational Technologies for Control and Management of abstracted entities. Metaphilosophy.  https://doi.org/10.1111/meta.12267
  16. DuPont Q (2017c) An archeology of cryptography: rewriting plaintext, encryption, and ciphertext. PhD dissertation, University of TorontoGoogle Scholar
  17. DuPont Q (2012) Cracking the Agrippa Code. http://www.crackingagrippa.net/. Accessed 19 Oct 2012
  18. DuPont Q (2013) Cracking the Agrippa code: cryptography for the digital humanities. Scholarly and Research Communication 4:1–8.  https://doi.org/10.22230/src.2013v4n3a126CrossRefGoogle Scholar
  19. Eco U (1986) Semiotics and the philosophy of language. Indiana University Press, BloomingtonGoogle Scholar
  20. Eco U (1995) The search for the perfect language. Blackwell, Cambridge, MAGoogle Scholar
  21. Ellis JH (1999) The history of non-secret encryption. Cryptologia 23:267–273.  https://doi.org/10.1080/0161-119991887919CrossRefGoogle Scholar
  22. Ellis JH (1970) The possibility of secure non-secret digital encryption. https://www.gchq.gov.uk/possibility-secure-non-secret-encryption
  23. Ellison K (2008) Cryptogrammatophoria: the romance and novelty of losing readers in code. Eighteenth Century Fiction 20:281–305CrossRefGoogle Scholar
  24. Ellison K (2011) Millions of millions of distinct orders: multimodality in seventeenth-century cryptography manuals. Book History 14:1–24CrossRefGoogle Scholar
  25. Ellison K (2013) Digital scholarship as handwork and brainwork: an early modern history of cryptography. Journal for Early Modern Cultural Studies 13:29–46CrossRefGoogle Scholar
  26. Ellison K (2014) ‘1144000727777607680000 wayes’: Early Modern Cryptography as Fashionable Reading. Journal of the Northern Renaissance 6. http://www.northernrenaissance.org/1144000727777607680000-wayes-early-moderncryptography-as-fashionable-reading/
  27. Ellison K (2017) A cultural history of early modern English cryptography manuals. Routledge, New YorkGoogle Scholar
  28. Ellison K, Kim S (eds) (2018) A material history of medieval and early modern ciphers: cryptography and the history of literacy. Routledge, New YorkGoogle Scholar
  29. Fuller M (ed) (2008) Software studies: a lexicon. MIT Press, Cambridge, MAGoogle Scholar
  30. Gebhart G (2017) We’re Halfway to Encrypting the Entire Web. In: Electronic Frontier Foundation. https://www.eff.org/deeplinks/2017/02/were-halfway-encrypting-entire-web. Accessed 20 Jun 2017
  31. Golumbia D (2016) The politics of bitcoin: software as right-wing extremism. University Of Minnesota Press, MinneapolisGoogle Scholar
  32. Hartley RVL (1928) Transmission of information. Bell Syst Tech J 3:535–563CrossRefGoogle Scholar
  33. Hayles NK (1999) How we became Posthuman: virtual bodies in cybernetics, literature, and informatics. University of Chicago Press, ChicagoCrossRefGoogle Scholar
  34. Hu T-H (2015) A prehistory of the cloud. The MIT Press, Cambridge, MACrossRefGoogle Scholar
  35. Jones ML (2016) Calculating devices and computers. In: Lightman BV (ed) A companion to the history of science. Wiley, Malden, pp 472–481Google Scholar
  36. Kahn D (1967) The codebreakers: the story of secret writing. Macmillan, New YorkGoogle Scholar
  37. Kirby V (2003) Enumerating language: “the unreasonable effectiveness of mathematics”. Configurations 11:417–439.  https://doi.org/10.1353/con.2004.0028CrossRefGoogle Scholar
  38. Kirschenbaum M (2008) Mechanisms: new media and the forensic imagination. MIT Press, Cambridge, MAGoogle Scholar
  39. Kittler F (1999) Gramophone, film, typewriter, 1st edn. Stanford University Press, StanfordGoogle Scholar
  40. Kittler F (1990) Discourse networks 1800/1900. Stanford University Press, StanfordGoogle Scholar
  41. Korolov M (2016) Study: Encryption use increase largest in 11 years. In: CSO Online. http://www.csoonline.com/article/3088916/data-protection/study-encryption-use-increase-largest-in-11-years.html. Accessed 20 Jun 2017
  42. Krämer S (2015) Medium, messenger, transmission: an approach to media philosophy. Amsterdam University Press, AmsterdamCrossRefGoogle Scholar
  43. Lennon B (2010) In Babel’s shadow : multilingual literatures, monolingual states. University of Minnesota Press, MinneapolisGoogle Scholar
  44. Lennon B (2015) Passwords: Philology, Security, Authentication Diacritics 43:82–104Google Scholar
  45. Liu A (2004) The Laws of cool: knowledge work and the culture of information. University of Chicago Press, ChicagoCrossRefGoogle Scholar
  46. Long PO (2004) Openness, secrecy, authorship: technical arts and the culture of knowledge from antiquity to the renaissance, paperbacks ed. Johns Hopkins University Press, BaltimoreGoogle Scholar
  47. Maat J (2004) Philosophical languages in the seventeenth century: Dalgarno, Wilkins, Leibniz. Springer, DordrechtCrossRefGoogle Scholar
  48. Mackenzie A (2006) Cutting code: software and sociality. Peter Lang, New YorkGoogle Scholar
  49. Mateas M (2008) Weird Languages. In: Fuller M (ed) Software studies: a lexicon. MIT Press, Cambridge MAGoogle Scholar
  50. Mateas M, Montfort N (2005) A box, darkly: Obfuscation, weird languages, and code aesthetics. In: Proceedings of the 6th Digital Arts and Culture Conference, IT University of Copenhagen. pp 144–153Google Scholar
  51. Montfort N (2008) Obfuscated code. In: Fuller M (ed) Software studies: a lexicon. MIT Press, Cambridge MAGoogle Scholar
  52. NSS Labs (2016) NSS Labs Predicts 75% of Web Traffic Will Be Encrypted by 2019. https://www.nsslabs.com/company/news/press-releases/nss-labs-predicts-75-of-web-traffic-will-be-encrypted-by-2019/. Accessed 20 Jun 2017
  53. Nyquist H (1924) Certain factors affecting telegraph speed. Bell Syst Tech J 3:324–346CrossRefGoogle Scholar
  54. Oxford English Dictionary (2014) algorithm, n. OED OnlineGoogle Scholar
  55. Pasquale F (2015) The black box society: the secret algorithms that control money and information. Harvard University Press, Cambridge, MACrossRefGoogle Scholar
  56. Pesic P (2000) Labyrinth: a search for the hidden meaning of science. MIT Press, Cambridge, MAGoogle Scholar
  57. Potter L (1989) Secret rites and secret writing: royalist literature. Cambridge University Press, New York, pp 1641–1660Google Scholar
  58. Raley R (2003) Machine translation and global English. The Yale Journal of Criticism 16:291–313.  https://doi.org/10.1353/yale.2003.0022CrossRefGoogle Scholar
  59. Reeds JA, Diffie W, Field JV (eds) (2015) Breaking Teleprinter ciphers at Bletchley Park: an edition of I.J. Good, D. Michie and G. Timms: general report on tunny with emphasis on statistical methods (1945). Wiley-IEEE Press, HobokenGoogle Scholar
  60. Rosenheim S (1997) The cryptographic imagination: secret writings from Edgar Allen Poe to the internet. The Johns Hopkins University Press, BaltimoreGoogle Scholar
  61. Sandvine (2016) 70% Of Global Internet Traffic Will Be Encrypted In 2016. https://www.sandvine.com/pr/2016/2/11/sandvine-70-of-global-internet-traffic-will-be-encrypted-in-2016.html. Accessed 20 Jun 2017
  62. Shannon C (1945) A mathematical theory of cryptography. Bell labs. Murray HillGoogle Scholar
  63. Shannon C (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:656–715CrossRefGoogle Scholar
  64. Sherman WH (2010) How to make anything signify anything. CabinetGoogle Scholar
  65. Singh S (2000) The code book: the science of secrecy from ancient Egypt to quantum cryptography. Anchor Books, New YorkGoogle Scholar
  66. Steiner G (1998) After babel: aspects of language and translation, third edition. Oxford Paperbacks, New YorkGoogle Scholar
  67. Stolzenberg D (ed) (2001) The great art of knowing: the baroque Encyclopedia of Athanasius Kircher. Stanford University Libraries, FlorenceGoogle Scholar
  68. Thomsen SW (2009) Some evidence concerning the genesis of Shannon’s information theory. Stud Hist Phil Sci 40:81–91CrossRefGoogle Scholar
  69. Wigner EP (1960) The unreasonable effectiveness of mathematics in the natural sciences. Commun Pure Appl Math 13:1–14CrossRefGoogle Scholar
  70. Williamson MJ (1974) Non-secret encryption using a finite field. https://www.gchq.gov.uk/non-secret-encryption-using-finite-field
  71. Zielinski S (2008) Deep time of the media: toward an archaeology of hearing and seeing by technical means. MIT Press, Cambridge, MAGoogle Scholar

Copyright information

© Springer Science+Business Media B.V., part of Springer Nature 2018

Authors and Affiliations

  1. 1.Information SchoolUniversity of WashingtonSeattleUSA

Personalised recommendations