Crypto: How the Code Rebels Beat the Government--Saving Privacy in the Digital AgePenguin, 2001 M01 8 - 368 páginas If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy—the author who made "hackers" a household word—comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of "crypto rebels"—nerds and visionaries turned freedom fighters—teamed up with corporate interests to beat Big Brother and ensure our privacy on the Internet. Levy's history of one of the most controversial and important topics of the digital age reads like the best futuristic fiction. |
Contenido
Sección 19 | |
Sección 20 | |
Sección 21 | |
Sección 22 | |
Sección 23 | |
Sección 24 | |
Sección 25 | |
Sección 26 | |
Sección 9 | |
Sección 10 | |
Sección 11 | |
Sección 12 | |
Sección 13 | |
Sección 14 | |
Sección 15 | |
Sección 16 | |
Sección 17 | |
Sección 18 | |
Sección 27 | |
Sección 28 | |
Sección 29 | |
Sección 30 | |
Sección 32 | |
Sección 33 | |
Sección 34 | |
Sección 35 | |
Sección 36 | |
Otras ediciones - Ver todas
Crypto: How the Code Rebels Beat the Government--Saving Privacy in the ... Steven Levy Sin vista previa disponible - 2002 |
Crypto: How the Code Rebels Beat the Government--Saving Privacy in the ... Steven Levy Sin vista previa disponible - 2001 |
Términos y frases comunes
academic actually Adleman Alice anonymous attack began bits called Chaum cipher ciphertext Clinton Clipper Chip Codebreakers communications course crack cryptanalysis cryptosystem Cylink cypherpunks Data Encryption Standard decryption Diffie and Hellman Diffie-Hellman Diffie’s digital signature eavesdropper electronic Ellis Encryption Standard export Feistel figured Fort Meade GCHQ going government’s guys idea implementation Inman Internet issue Jim Bidzos key escrow key size knapsack knew Konheim later Len Adleman license Lotus Lucifer Marty Hellman mathematical Meade memo Merkle Merkle’s Microsoft Myhrvold National Security Agency Netscape NIST NSA’s O’Brien one-way function paper patent Phil Zimmermann plaintext potential problem protect public key cryptography puzzle Ray Ozzie remailer Ron Rivest RSA Data Security RSA’s says scheme scrambled secret key Shamir solution someone Stanford thing trapdoor Triple Fence Tuchman users wanted Whit Diffie wrote