326 research outputs found

    Letter counting: a stem cell for Cryptology, Quantitative Linguistics, and Statistics

    Full text link
    Counting letters in written texts is a very ancient practice. It has accompanied the development of Cryptology, Quantitative Linguistics, and Statistics. In Cryptology, counting frequencies of the different characters in an encrypted message is the basis of the so called frequency analysis method. In Quantitative Linguistics, the proportion of vowels to consonants in different languages was studied long before authorship attribution. In Statistics, the alternation vowel-consonants was the only example that Markov ever gave of his theory of chained events. A short history of letter counting is presented. The three domains, Cryptology, Quantitative Linguistics, and Statistics, are then examined, focusing on the interactions with the other two fields through letter counting. As a conclusion, the eclectism of past centuries scholars, their background in humanities, and their familiarity with cryptograms, are identified as contributing factors to the mutual enrichment process which is described here

    The Cryptographic Imagination

    Get PDF
    Originally published in 1996. In The Cryptographic Imagination, Shawn Rosenheim uses the writings of Edgar Allan Poe to pose a set of questions pertaining to literary genre, cultural modernity, and technology. Rosenheim argues that Poe's cryptographic writing—his essays on cryptography and the short stories that grew out of them—requires that we rethink the relation of poststructural criticism to Poe's texts and, more generally, reconsider the relation of literature to communication. Cryptography serves not only as a template for the language, character, and themes of much of Poe's late fiction (including his creation, the detective story) but also as a "secret history" of literary modernity itself. "Both postwar fiction and literary criticism," the author writes, "are deeply indebted to the rise of cryptography in World War II." Still more surprising, in Rosenheim's view, Poe is not merely a source for such literary instances of cryptography as the codes in Conan Doyle's "The Dancing-Men" or in Jules Verne, but, through his effect on real cryptographers, Poe's writing influenced the outcome of World War II and the development of the Cold War. However unlikely such ideas sound, The Cryptographic Imagination offers compelling evidence that Poe's cryptographic writing clarifies one important avenue by which the twentieth century called itself into being. "The strength of Rosenheim's work extends to a revisionistic understanding of the entirety of literary history (as a repression of cryptography) and then, in a breathtaking shift of register, interlinks Poe's exercises in cryptography with the hyperreality of the CIA, the Cold War, and the Internet. What enables this extensive range of applications is the stipulated tension Rosenheim discerns in the relationship between the forms of the literary imagination and the condition of its mode of production. Cryptography, in this account, names the technology of literary production—the diacritical relationship between decoding and encoding—that the literary imagination dissimulates as hieroglyphics—the hermeneutic relationship between a sign and its content."—Donald E. Pease, Dartmouth Colleg

    A Reevaluation of the Damage Done to the United States by Soviet Espionage

    Get PDF
    Popular opinion and many historians portray the effects of Soviet espionage on the United States as disastrous. Although covert Soviet efforts undeniably harmed America, their extent and gravity has been greatly exaggerated. This paper evaluates primary and secondary sources on the subject to strike a delicate balance between minimizing and inflating the effects of Soviet activities. It acknowledges that espionage did some damage, but questions the legal status, extent, and effect of much of the Soviets’ “stolen” information, ultimately arguing that most Soviet espionage was actually more harmful to the Soviet Union than to the United States

    Do libertarians dream of electric coins? The material embeddedness of Bitcoin

    Get PDF
    The new, decentralized, anonymous digital currency Bitcoin has in less than three years gone from a proof-of-concept to being traded for about €78 million on a daily basis. Its ascendancy offers up a puzzle for financial regulators and other law enforcers worldwide, while also promising to fulfill the political visions of a group of market-anarchist cryptographers. While it is still a very small economy in absolute terms, Bitcoin also poses some interesting challenges to traditional economic institutions, and is thus an interesting case for economic sociology. Using the notion of material embeddedness, this paper examines the possible implications of a further propagation of Bitcoin. If the currency proves a success, this will have ramifications for a large number of economic institutions, such as the possibility of taxation of untraceable money, the credit economy and interest rates, and international currency control.© 2014 Taylor & Francis. This is the authors’ accepted and refereed manuscript to the article

    The Moral Character of Cryptographic Work

    Get PDF
    Cryptography rearranges power: it configures who can do what, from what. This makes cryptography an inherently \textit{political} tool, and it confers on the field an intrinsically \textit{moral} dimension. The Snowden revelations motivate a reassessment of the political and moral positioning of cryptography. They lead one to ask if our inability to effectively address mass surveillance constitutes a failure of our field. I believe that it does. I call for a community-wide effort to develop more effective means to resist mass surveillance. I plea for a reinvention of our disciplinary culture to attend not only to puzzles and math, but, also, to the societal implications of our work

    Mistrust: Ethnographic Approximations

    Get PDF
    Scholars have long seen trust as a foundational social good. We therefore have ample studies on building trust in free markets, on cultivating trust in the state, and on rebuilding trust through civil society. The contributors to this volume, instead, take a step back. They ask: Can mistrust ever be more than the flip side of trust, more than the sign of an absence or failure? By looking ethnographically at what a variety of actors actually do when they express mistrust, this volume offers a richly empirical trove of the social life of mistrust across a range of settings

    Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments

    Get PDF
    Decentralized systems are a subset of distributed systems where multiple authorities control different components and no authority is fully trusted by all. This implies that any component in a decentralized system is potentially adversarial. We revise fifteen years of research on decentralization and privacy, and provide an overview of key systems, as well as key insights for designers of future systems. We show that decentralized designs can enhance privacy, integrity, and availability but also require careful trade-offs in terms of system complexity, properties provided, and degree of decentralization. These trade-offs need to be understood and navigated by designers. We argue that a combination of insights from cryptography, distributed systems, and mechanism design, aligned with the development of adequate incentives, are necessary to build scalable and successful privacy-preserving decentralized systems
    • …
    corecore