Cryptography Quotes

We've searched our database for all the quotes and captions related to Cryptography. Here they are! All 100 of them:

here’s a toast to Alan Turing born in harsher, darker times who thought outside the container and loved outside the lines and so the code-breaker was broken and we’re sorry yes now the s-word has been spoken the official conscience woken – very carefully scripted but at least it’s not encrypted – and the story does suggest a part 2 to the Turing Test: 1. can machines behave like humans? 2. can we?
Matt Harvey
One must acknowledge with cryptography no amount of violence will ever solve a math problem.
Jacob Appelbaum (Cypherpunks: Freedom and the Future of the Internet)
When we pair modern tech like Blockchain technology, cryptography and data analytics with the ancient practice of bartering, a lot of business opportunities emerge.
Hendrith Vanlon Smith Jr.
Computers had their origin in military cryptography—in a sense, every computer game represents the commandeering of a military code-breaking apparatus for purposes of human expression.
Austin Grossman (You)
-How long do you want these messages to remain secret?[...] +I want them to remain secret for as long as men are capable of evil.
Neal Stephenson (Cryptonomicon)
Cryptographic tokens can be used as tools of stigmergy to incentivize good behavior and decentivize bad behavior in the context of business systems.
Hendrith Vanlon Smith Jr.
Adaptive collective action is superior to bureaucracy.
Hendrith Vanlon Smith Jr.
Imagine a young Isaac Newton time-travelling from 1670s England to teach Harvard undergrads in 2017. After the time-jump, Newton still has an obsessive, paranoid personality, with Asperger’s syndrome, a bad stutter, unstable moods, and episodes of psychotic mania and depression. But now he’s subject to Harvard’s speech codes that prohibit any “disrespect for the dignity of others”; any violations will get him in trouble with Harvard’s Inquisition (the ‘Office for Equity, Diversity, and Inclusion’). Newton also wants to publish Philosophiæ Naturalis Principia Mathematica, to explain the laws of motion governing the universe. But his literary agent explains that he can’t get a decent book deal until Newton builds his ‘author platform’ to include at least 20k Twitter followers – without provoking any backlash for airing his eccentric views on ancient Greek alchemy, Biblical cryptography, fiat currency, Jewish mysticism, or how to predict the exact date of the Apocalypse. Newton wouldn’t last long as a ‘public intellectual’ in modern American culture. Sooner or later, he would say ‘offensive’ things that get reported to Harvard and that get picked up by mainstream media as moral-outrage clickbait. His eccentric, ornery awkwardness would lead to swift expulsion from academia, social media, and publishing. Result? On the upside, he’d drive some traffic through Huffpost, Buzzfeed, and Jezebel, and people would have a fresh controversy to virtue-signal about on Facebook. On the downside, we wouldn’t have Newton’s Laws of Motion.
Geoffrey Miller
Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on. Unfortunately, endpoint security is so terrifically weak that NSA can frequently find ways around it.
Edward Snowden
The enemy knows the system
Claude Shannon
This has serveral consequences, starting with screwing over most cryptography algorithms--translation: all your bank account are belong to us--
Charles Stross (The Atrocity Archives (Laundry Files, #1))
The value we provide at Mayflower-Plymouth exists at the convergence of various technologies and studies including Blockchain, cryptography, quantum computing, permaculture design principles, artificial intelligence, stigmergy, forestry, economics, additive manufacturing, big data, advanced logistics and more.
Hendrith Vanlon Smith Jr.
He stopped, because he wasn’t sure what Cryptography had established, and because he needed another moment to haul himself down from the ledges of her high cheekbones, to retreat from the caves of her eyes.
Samuel R. Delany (Babel-17)
The value we provide at Mayflower exists at the convergence of various new technologies and studies including Blockchain, cryptography, quantum computing, artificial intelligence, stigmergy, additive manufacturing, big data, advanced logistics and more.
Hendrith Vanlon Smith Jr.
It's not about Bitcoin or Ethereum or NFT's... These things have merely shown us what's possible. But the real value is in Cryptography, Blockchain Technology, Cryptocurrency and Smart Contracts - these are the things with the real business implications.
Hendrith Vanlon Smith Jr.
if a message protected by quantum cryptography were ever to be deciphered, it would mean that quantum theory is flawed,
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
The world is not sliding, but galloping into a new transnational dystopia. This development has not been properly recognized outside of national security circles. It has been hidden by secrecy, complexity and scale. The internet, our greatest tool of emancipation, has been transformed into the most dangerous facilitator of totalitarianism we have ever seen. The internet is a threat to human civilization. These transformations have come about silently, because those who know what is going on work in the global surveillance industry and have no incentives to speak out. Left to its own trajectory, within a few years, global civilization will be a postmodern surveillance dystopia, from which escape for all but the most skilled individuals will be impossible. In fact, we may already be there. While many writers have considered what the internet means for global civilization, they are wrong. They are wrong because they do not have the sense of perspective that direct experience brings. They are wrong because they have never met the enemy.
Julian Assange (Cypherpunks: Freedom and the Future of the Internet)
Modern technologies are 99 percent bravery , and 1 percent investment
Arif Naseem
Understanding block-chain makes you go mad, unless you start your own cult
Arif Naseem
if N is large enough, it is virtually impossible to deduce p and q from N, and this is perhaps the most beautiful and elegant aspect of the RSA asymmetric cipher.
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
Even though we don't know which companies the NSA has compromised – or by what means – knowing that they could have compromised any of them is enough to make us mistrustful of all of them. This is going to make it hard for large companies like Google and Microsoft to get back the trust they lost. Even if they succeed in limiting government surveillance. Even if they succeed in improving their own internal security. The best they'll be able to say is: "We have secured ourselves from the NSA, except for the parts that we either don't know about or can't talk about.
Bruce Schneier
While I pray that public awareness and debate will lead to reform, bear in mind that the policies of men change in time, and even the Constitution is subverted when the appetites of power demand it. In words from history: Let us speak no more of faith in man, but bind him down from mischief by the chains of cryptography. I instantly recognized the last sentence as a play on a Thomas Jefferson quote from 1798 that I often cited in my writing: “In questions of power, then, let no more be heard of confidence in man, but bind him down from mischief by the chains of the Constitution.
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
the enemy of security: repetition leads to patterns, and cryptanalysts thrive on patterns.
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
An immortal instinct deep within the spirit of man is thus plainly a sense of the Beautiful.
Edgar Allan Poe (Edgar Allan Poe: Complete Essays, Literary Studies, Criticism, Cryptography & Autography, Translations, Letters and Other Non-Fiction Works: The Philosophy ... Fifty Suggestions, Exordium, Marginalia…)
Gideon was lolling behind Harrow, picking at her fingernails and staring at the pieces of paper, which had handwriting that was more like cryptography.
Tamsyn Muir (Gideon the Ninth (The Locked Tomb, #1))
Bitcoin’s cryptography is solid, but it’s a bit like putting a six inch thick steel vault door in a cardboard frame.
David Gerard (Attack of the 50 Foot Blockchain: Bitcoin, Blockchain, Ethereum & Smart Contracts)
Some days I spent up to three hours in the arcade after school, dimly aware that we were the first people, ever, to be doing these things. We were feeling something they never had - a physical link into the world of the fictional - through the skeletal muscles of the arm to the joystick to the tiny person on the screen, a person in an imagined world. It was crude but real. We'd fashioned an outpost in the hostile, inaccessible world of the imagination, like dangling a bathysphere into the crushing dark of the deep ocean, a realm hitherto inaccessible to humankind. This is what games had become. Computers had their origin in military cryptography - in a sense, every computer game represents the commandeering of a military code-breaking apparatus for purposes of human expression. We'd done that, taken that idea and turned it into a thing its creators never imagined, our own incandescent mythology.
Austin Grossman (You)
The tactic seemed to work, so he stuck to the same theme for the next few days, but there was only so much cryptography he could teach before it started squeezing out everything else.
Elizabeth Bear (Some of the Best from Tor.com, 2019 edition)
For much of history since its beginning in ancient Egypt, the essence of cryptography—which takes its name from the Greek words for “hidden” and “writing”—lay in encoding language to keep a message secret.
Paul Vigna (The Age of Cryptocurrency: How Bitcoin and Digital Money Are Challenging the Global Economic Order)
Ron Rivest, one of the inventors of RSA, thinks that restricting cryptography would be foolhardy: It is poor policy to clamp down indiscriminately on a technology just because some criminals might be able to use it to their advantage. For example, any U.S. citizen can freely buy a pair of gloves, even though a burglar might use them to ransack a house without leaving fingerprints. Cryptography is a data-protection technology, just as gloves are a hand-protection technology. Cryptography protects data from hackers, corporate spies, and con artists, whereas gloves protect hands from cuts, scrapes, heat, cold, and infection. The former can frustrate FBI wiretapping, and the latter can thwart FBI fingerprint analysis. Cryptography and gloves are both dirt-cheap and widely available. In fact, you can download good cryptographic software from the Internet for less than the price of a good pair of gloves.
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
Cryptography is a science of deduction and controlled experiment; hypotheses are formed, tested and often discarded. But the residue which passes the test grows until finally there comes a point when the experimenter feels solid ground beneath his feet: his hypotheses cohere, and fragments of sense emerge from their camouflage. The code 'breaks'. Perhaps this is best defined as the point when the likely leads appear faster than they can be followed up. It is like the initiation of a chain-reaction in atomic physics; once the critical threshold is passed, the reaction propagates itself.
John Chadwick (The Decipherment of Linear B)
One of the most singular characteristics of the art of deciphering is the strong conviction possessed by every person, even moderately acquainted with it, that he is able to construct a cipher which nobody else can decipher. I have also observed that the cleverer the person, the more intimate is his conviction.
Charles Babbage (Passages from the Life of a Philosopher (The Pickering Masters))
Tomorrow's banks will be decentralized applications of software built on cryptography, blockchain technology and smart contracts. Theyll be platforms for saving, lending, investing, moving and spending that are much more equitable and sensible than they were in the 20th century and ironically it'll be more aligned to what banks were like in much earlier civilizations. So when I talk about banks being to the economy what the heart is to the human body - this is really what I'm talking about. I'm not necessarily talking about the ICBC. The ICBC or Bank of America may play an important role, but so could thousands of small local banks or small apps on a Blockchain.
Hendrith Vanlon Smith Jr.
I describe Bitcoin as "a digital version of gold" eGold.
Arif Naseem
Not afraid of heights - afraid of widths.
Thomas St Germain
Enigma was considered invulnerable, until the Poles revealed its weaknesses.
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
This apparently innocuous observation would lead to the first great breakthrough in cryptanalysis.
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
A little bit of math can accomplish what all the guns and barbed wire can't: a little bit of math can keep a secret.
Edward Snowden (Permanent Record)
The NSA employs more mathematicians, buys more computer hardware, and intercepts more messages than any other organization in the world.
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
You’re British, you’re a priest, you’re a medical doctor, you can handle a rifle, you know Morse Code, and most importantly of all, you’re a fucking pain in the ass – so off you go!
Neal Stephenson (Cryptonomicon)
The first known European book to describe the use of cryptography was written in the thirteenth century by the English Franciscan monk and polymath Roger Bacon. Epistle on the Secret Works of Art and the Nullity of Magic included seven methods for keeping messages secret, and cautioned: “A man is crazy who writes a secret in any other way than one which will conceal it from the vulgar.
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
like Turing and the cryptanalysts at Bletchley Park, the Navajo were ignored for decades. Eventually, in 1968, the Navajo code was declassified, and the following year the code talkers held their first reunion.
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
There is a remarkably close parallel between the problems of the physicist and those of the cryptographer. The system on which a message is enciphered corresponds to the laws of the universe, the intercepted messages to the evidence available, the keys for a day or a message to important constants which have to be determined. The correspondence is very close, but the subject matter of cryptography is very easily dealt with by discrete machinery, physics not so easily.” —Alan Turing
Neal Stephenson (Cryptonomicon)
On the dimension of technology, the conflict has two poles: AI and crypto. Artificial Intelligence holds out the prospect of finally solving what economists call the “calculation problem”: AI could theoretically make it possible to centrally control an entire economy. It is no coincidence that AI is the favorite technology of the Communist Party of China. Strong cryptography, at the other pole, holds out the prospect of a decentralized and individualized world. If AI is communist, crypto is libertarian.
James Dale Davidson (The Sovereign Individual: Mastering the Transition to the Information Age)
A friend of ours encountered this problem with his home-built computer long ago. He wrote a BIOS that used a magic value in a particular memory location to determine whether a reset was a cold reboot or a warm reboot. After a while the machine refused to boot after power-up because the memory had learned the magic value, and the boot process therefore treated every reset as a warm reboot. As this did not initialize the proper variables, the boot process failed. The solution in his case was to swap some memory chips around, scrambling the magic value that the SRAM had learned. For us, it was a lesson to remember: memory retains more data than you think.
Niels Ferguson (Cryptography Engineering: Design Principles and Practical Applications)
There was nothing I could do except homework. I cracked open Forsyth’s Basics of Cryptography, read until my eyes went bleary, then looked at my clock and saw it was only four thirty in the afternoon. Time really crawled when you were on lockdown. I struggled through another chapter, nodding off seventeen or eighteen times, then checked my clock again. It was still four thirty in the afternoon. Either time really crawled when you were on lockdown or my clock was broken. I checked my phone. In fact, it was eight thirty at night, which explained why I was so darn hungry. No one had come to get me for dinner. I wondered if this was part of my punishment or if the administration had simply forgotten about me. I’d now been at spy school long enough to guess it was the latter, which began to worry me. I could get through the night without food, but if someone didn’t remember I was in the Box by the next morning, things could get dicey. Still, it wasn’t worth panicking yet. Maybe this was merely a test to see how I handled pressure. If so, I’d show them I was a tough egg to crack. For the benefit of any cameras that might have been on me, I played it cool, as though I were really enjoying being on lockdown. I laid back on my cot and gave a contented sigh. “This is great,” I said to any concealed microphones. “All this time to myself. It’s like being on vacation.” Then I casually examined my clock to see if I could keep it from telling me that it was eternally four thirty in the afternoon.
Stuart Gibbs (Spy School)
Back in 2015, a volunteer group called Bitnation set up something called the Blockchain Emergency ID. There’s not a lot of data on the project now, BE-ID - used public-key cryptography to generate unique IDs for people without their documents. People could verify their relations, that these people belonged to their family, and so on. It was a very modern way of maintaining an ID; secure, fast, and easy to use. Using the Bitcoin blockchain, the group published all these IDs on to a globally distributed public ledger, spread across the computers of every single Bitcoin user online - hundreds of thousands of users, in those times. Once published, no government could undo it; the identities would float around in the recesses of the Internet. As long as the network remained alive, every person's identity would remain intact, forever floating as bits and bytes between the nations: no single country, government or company could ever deny them this. “That was, and I don't say this often, the fucking bomb,” said Common, In one fell swoop, identities were taken outside government control. BE-ID, progressing in stages, became the refugees' gateway to social assistance and financial services. First it became compliant with UN guidelines. Then it was linked to a VISA card. And thus out of the Syrian war was something that looked like it could solve global identification forever. Experts wrote on its potential. No more passports. No more national IDs. Sounds familiar? Yes, that’s the United Nations Identity in a nutshell. Julius Common’s first hit - the global identity revolution that he sold first to the UN, and then to almost every government in the world - was conceived of when he was a teenager.
Yudhanjaya Wijeratne (Numbercaste)
Those “weird evolutions” enabled by a CTC, Ringbauer notes, would have remarkable practical applications, such as breaking quantum-based cryptography through the cloning of the quantum states of fundamental particles. “If you can clone quantum states,” he says, “you can violate the Heisenberg uncertainty principle,” which comes in handy in quantum cryptography because the principle forbids simultaneously accurate measurements of certain kinds of paired variables, such as position and momentum. “But if you clone that system, you can measure one quantity in the first and the other quantity in the second, allowing you to decrypt an encoded message.
Anonymous
Step 1: The sender places the present in the briefcase, which they lock with their padlock and remove their key. They then send the locked briefcase to the receiver. Note: While the briefcase is en route from sender to receiver, it is safe from all adversaries, because they cannot remove the padlock from the briefcase. However, the receiver is also unable to obtain the present. Step 2: The receiver locks the briefcase with their own padlock and removes the key. They then return it to the sender. Note: The briefcase is now locked with two padlocks so no one can get the present. Step 3: The sender uses their own key to remove their padlock from the briefcase and returns the briefcase to the receiver. Note: The only lock on the briefcase belongs to the receiver. Step 4: The receiver removes their padlock from the briefcase to obtain the present.
Fred C. Piper (Cryptography: A Very Short Introduction (Very Short Introductions Book 68))
In this simplistic example we have to admit that the sender has no way of knowing whose padlock is on the briefcase and that it might be possible for an adversary to impersonate the receiver and place their padlock on the briefcase. This is a problem that has to be addressed. The ‘Whose padlock is it?’ question in this briefcase example is similar to the ‘Whose public key is it?’ question that is so important when public key systems are used.
Fred C. Piper (Cryptography: A Very Short Introduction (Very Short Introductions Book 68))
The only people who are in a position to point out my errors are also those who are not at liberty to reveal them.
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
A blockchain is a fully-distributed, peer-to-peer software network which makes use of cryptography to securely host applications, store data, and easily transfer digital instruments of value that represent real-world money.
Chris Dannen (Introducing Ethereum and Solidity: Foundations of Cryptocurrency and Blockchain Programming for Beginners)
One cartographer does not only understand how to analyse cryptography by old times.
Petra Hermans
Had the Arabs merely been familiar with the use of the mono-alphabetic substitution cipher, they would not warrant a significant mention in any history of cryptography. However, in addition to employing ciphers, the Arab scholars were also capable of destroying ciphers. They in fact invented cryptanalysis, the science of unscrambling a message without knowledge of the key. While the cryptographer develops new methods of secret writing, it is the cryptanalyst who struggles to find weaknesses in these methods in order to break into secret messages. Arabian cryptanalysts succeeded in finding a method for breaking the monoalphabetic substitution cipher, a cipher that had remained invulnerable for several centuries.
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
Cryptanalysis could not be invented until a civilization had reached a sufficiently sophisticated level of scholarship in several disciplines, including mathematics, statistics, and linguistics. The Muslim civilization provided an ideal cradle for cryptanalysis, because Islam demands justice in all spheres of human activity, and achieving this requires knowledge, or ilm. Every Muslim is obliged to pursue knowledge in all its forms, and the economic success of the Abbasid caliphate meant that scholars had the time, money, and materials required to fulfil their duty. They endeavoured to acquire knowledge of previous civilizations by obtaining Egyptian, Babylonian, Indian, Chinese, Farsi, Syriac, Armenian, Hebrew and Roman texts and translating them into Arabic. In 815, the Caliph of Ma'mun established in Baghdad the Bait al-Hikmah ('House of Wisdom'), a library and centre for translation.
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
At the same time as acquiring knowledge, the Islamic civilization was able to disperse it, because it had procured the art of paper-making from the Chinese. The manufacture of paper gave rise to the profession of warraqin, or 'those who handle paper,' human photocopying machines who copied manuscripts and supplied the burgeoning publishing industry. At its peak, tens of thousands of books were published every year, and in just one suburb of Baghdad there were over a hundred bookshops. As well as such classics as Tales from the Thousand and One Nights, these bookshops also sold textbooks on every imaginable subject, and helped to support the most literate and learned society in the world.
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
In addition to a greater understanding of secular subjects, the invention of cryptanalysis aslo depended on the growth of religious sholarship. Major theological schools were established in Basra, Kufa and Baghdad, where thelogians scrutinized the revelations of Muhammad as contained in the Koran. The theologians were interested in establishing the chronology of the revelations, which they did by counting the frequencies of words contained in each revelation. The theory was that certain words had evolved relatively recently, and hence if a revelation contained a high number of these newer words, this would indicate that it came later in the chronology. Theologians also studied the Hadith, which consists of the Prophet's daily utterances. They tried to demonstrate that each statement was indeed attributable to Muhammad. This was done by studying the etymology of words and the structure of sentences, to test whether particular texts were consistent with the linguistic patterns of the Prophet.
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
Al-Kindi's technique, known as frequency analysis, shows that it is unnecessary to check each of the billions of potential keys. Instead, it is possible to reveal the contents of a scrambled message simply by analysing the frequency of the characters in the ciphertext.
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
Interestingly, differential cryptanalysis was first discovered in the research community in 1990. At this point, the IBM team declared that the attack was known to the designers at least 16 years earlier, and that DES was especially designed to withstand differential cryptanalysis. Finally,
Christof Paar (Understanding Cryptography: A Textbook for Students and Practitioners)
one of the essential elements of cryptography: a deliberate transformation of the writing.
David Kahn (The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet)
soon as a culture has reached a certain level, probably measured largely by its literacy, cryptography appears spontaneously—as
David Kahn (The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet)
The only writer of the Middle Ages to describe cryptography instead of just using it was Roger Bacon, the English monk of startlingly modern speculations. In his Epistle on the Secret Works of Art and the Nullity of Magic, written about the middle of the 1200s,
David Kahn (The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet)
This list encompassed, for the first time in cryptography, both transposition and substitution systems, and, moreover, gave, in system 5, the first cipher ever to provide more than one substitute for a plaintext letter. Remarkable and important as this is, however, it is overshadowed by what follows—the first exposition on cryptanalysis in history.
David Kahn (The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet)
There are exceptions, for instance, the popular stream cipher RC4. •
Christof Paar (Understanding Cryptography: A Textbook for Students and Practitioners)
The Data Encryption Standard (DES) has been by far the most popular block cipher for most of the last 30 years. Even though it is nowadays not considered secure against a determined attacker because the DES key space is too small, it is still used in legacy applications. Furthermore, encrypting data three times in a row with DES — a process referred to as 3DES or triple DES — yields a very secure cipher which is still widely used today
Christof Paar (Understanding Cryptography: A Textbook for Students and Practitioners)
But of any science of cryptanalysis, there was nothing. Only cryptography existed. And therefore cryptology, which involves both cryptography and cryptanalysis, had not yet come into being so far
David Kahn (The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet)
The Arabic knowledge of cryptography was fully set forth in the section on cryptology in the Subh al-a ‘sha, an enormous, 14-volume encyclopedia
David Kahn (The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet)
But all those who used their knowledge in a bid to enact social change saw cryptography as a tool to enhance individual privacy and to shift power from big, central institutions to the human beings who live in their orbit.
Paul Vigna (The Age of Cryptocurrency: How Bitcoin and Digital Money Are Challenging the Global Economic Order)
From the early days of its existence, cryptology had served to obscure critical portions of writings dealing with the potent subject of magic—divinations, spells, curses, whatever conferred supernatural powers on its sorcerers. The first faint traces of this appeared in Egyptian cryptography. Plutarch reported that “sundry very ancient oracles were kept in secret writings by the priests” at Delphi. And before the fall of the Roman empire, secret writing was serving as a powerful ally of the necromancers in guarding their art from the profane. One of the most famous magic manuscripts, the so-called Leiden papyrus, discovered at Thebes and written in the third century A.D. in both Greek and a very late form of demotic, a highly simplified version of hieroglyphics, employs cipher to conceal the crucial portions of important recipes.
David Kahn (The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet)
Extremist sects in Islam cultivated cryptography to conceal their writings from the orthodox.
David Kahn (The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet)
Quantum cryptography would mark the end of the battle between codemakers and codebreakers, the codemakers emerging victorious, because quantum cryptography is a truly unbreakable system of encryption.
Simon Singh (The Code Book: The Secrets Behind Codebreaking)
Cryptography and security engineers need to know more than how current cryptographic protocols work; they need to know how to use cryptography.
Niels Ferguson (Cryptography Engineering)
Cryptography by itself is fairly useless. It has to be part of a much larger system.
Niels Ferguson (Cryptography Engineering)
A lock by itself is a singularly useless thing. It needs to be part of a much larger system. This larger system can be a door on a building, a chain, a safe, or something else.
Niels Ferguson (Cryptography Engineering)
Even though cryptography is only a small part of the security system, it is a very critical part. Cryptography is the part that has to provide access to some people but not to others. This is very tricky.
Niels Ferguson (Cryptography Engineering)
Cryptography takes on the role of the lock: it has to distinguish between “good” access and “bad” access. This is much more difficult than just keeping everybody out.
Niels Ferguson (Cryptography Engineering)
It is all too easy to spend hours arguing over the exact key length of cryptographic systems, but fail to notice or fix buffer overflow vulnerabilities in a Web application.
Niels Ferguson (Cryptography Engineering)
Some saw cryptography as a great technological equalizer, a mathematical tool that would put the lowliest privacy-seeking individual on the same footing as the greatest national intelligence agencies.
Niels Ferguson (Cryptography Engineering)
No one can post a false transaction without ownership of the corresponding account due to the asymmetric key cryptography protecting the accounts. You have one “public” key representing an address to receive tokens and a “private” key used to unlock and spend tokens over which you have custody. This same type of cryptography is used to protect your credit card information and data when using the Internet. A single account cannot “double spend” its tokens because the ledger keeps an audit of the balance at any given time and the faulty transaction would not clear. The ability to prevent a double spend without a central authority illustrates the primary advantage of using a blockchain to maintain the underlying ledger.
Campbell R. Harvey (DeFi and the Future of Finance)
language, especially the English language, was filled with redundancy and predictability. Indeed, he later calculated that English was about 75 to 80 percent redundant. This had ramifications for cryptography: The less redundancy you have in a message, the harder it is to crack its code.
Jon Gertner (The Idea Factory: Bell Labs and the Great Age of American Innovation)
Biggleman’s Safe was a hypothetical cryptography scenario in which a safe builder wrote blueprints for an unbreakable safe. He wanted to keep the blueprints a secret, so he built the safe and locked the blueprints inside.
Dan Brown (Digital Fortress)
Now, the obvious response is that a state like Venezuela can still try to beat someone up to get that solution, do the proverbial rubber hose attack to get their password and private keys — but first they’ll have to find that person’s offline identity, map it to a physical location, establish that they have jurisdiction, send in the (expensive) special forces, and do this to an endless number of people in an endless number of locations, while dealing with various complications like anonymous remailers, multisigs, zero-knowledge, dead-man’s switches, and timelocks. So at a minimum, encryption increases the cost of state coercion. In other words, seizing Bitcoin is not quite as easy as inflating a fiat currency. It’s not something a hostile state like Venezuela can seize en masse with a keypress, they need to go house-by-house. The only real way around this scalability problem would be a cheap autonomous army of AI police drones, something China may ultimately be capable of, but that’d be expensive and we aren’t there yet.41 Until then, the history of Satoshi Nakamoto’s successful maintenance of pseudonymity, of Apple’s partial thwarting of the FBI, and of the Bitcoin network’s resilience to the Chinese state’s mining shutdown show that the Network’s pseudonymity and cryptography are already partially obstructing at least some of the State’s surveillance and violence. Encryption thus limits governments in a way no legislation can.
Balaji S. Srinivasan (The Network State: How To Start a New Country)
Though Bitcoin fans frowned upon permissioned blockchains, Wall Street continued to build them. These tweaked versions of Bitcoin shared various elements of the cryptocurrency’s powerful cryptography and network rules. However, instead of its electricity-hungry “proof-of-work” consensus model, they drew upon older, pre-Bitcoin protocols that were more efficient but which couldn’t achieve the same level of security without putting a centralized entity in charge of identifying and authorizing participants. Predominantly, the bankers’ models used a consensus algorithm known as practical byzantine fault tolerance, or PBFT, a cryptographic solution invented in 1999. It gave all approved ledger-keepers in the network confidence that each other’s actions weren’t undermining the shared record even when there was no way of knowing whether one or more had malicious intent to defraud the others.
Michael J. Casey (The Truth Machine: The Blockchain and the Future of Everything)
In 2005, a computer expert named Ian Grigg, working at a company called Systemics, introduced a trial system he called “triple-entry bookkeeping.” Grigg worked in the field of cryptography, a science that dates way back to ancient times, when coded language to share “ciphers,” or secrets, first arose. Ever since Alan Turing’s calculating machine cracked the German military’s Enigma code, cryptography has underpinned much of what we’ve done in the computing age. Without it we wouldn’t be able to share private information across the Internet—such as our transactions within a bank’s Web site—without revealing it to unwanted prying eyes. As our computing capacity has exponentially grown, so too has the capacity of cryptography to impact our lives. For his part, Grigg believed it would lead to a programmable record-keeping system that would make fraud virtually impossible. In a nutshell, the concept took the existing, double-entry bookkeeping system and added a third book: the independent, open ledger that’s secured by cryptographic methods so that no one can change it. Grigg saw it as a way to combat fraud. The way Grigg described it, users would maintain their own, double-entry accounts, but added to these digitized books would be another function, essentially a time stamp, a cryptographically secured, signed receipt of every transaction. (The concept of a “signature” in cryptography means something far more scientific than a handwritten scrawl; it entails combining two associated numbers, or “keys”—one publicly known, the other private—to mathematically prove that the entity making the signature is uniquely authorized to do so.)
Michael J. Casey (The Truth Machine: The Blockchain and the Future of Everything)
Some technologies, such as surveillance, can give higher levels in the hierarchy more power over their subordinates, while other technologies, such as cryptography and online access to free press and education, can have the opposite effect and empower individuals.
Max Tegmark (Life 3.0: Being Human in the Age of Artificial Intelligence)
All mathematics is divided into three parts: cryptography (paid for by CIA, KGB and the like), hydrodynamics (supported by manufacturers of atomic submarines), and celestial mechanics (financed by military and other institutions dealing with missiles, such as NASA).
Vladimir I. Arnold
The French had handed the information from Schmidt to the Poles because they believed it to be of no value, but the Poles had proved them wrong.
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
CRYPTOLOGY, as the union of cryptography and cryptanalysis is called.
Neal Stephenson (Cryptonomicon)
destitute.
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
Turing’s secret had been exposed, and his sexuality was now public knowledge. The British Government withdrew his security clearance. He was forbidden to work on research projects relating to the development of the computer. He was forced to consult a psychiatrist and had to undergo hormone treatment, which made him impotent and obese. Over the next two years he became severely depressed, and on June 7, 1954, he went to his bedroom, carrying with him a jar of cyanide solution and an apple. Twenty years earlier he had chanted the rhyme of the Wicked Witch: “Dip the apple in the brew, Let the sleeping death seep through.” Now he was ready to obey her incantation. He dipped the apple in the cyanide and took several bites. At the age of just forty-two, one of the true geniuses of cryptanalysis committed suicide.
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
Jack Good, a veteran of Bletchley, commented: “Fortunately the authorities did not know that Turing was a homosexual. Otherwise we might have lost the war.
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
Bitcoin is designed around the idea of using cryptography to control the creation and transfer of money, rather than relying on central authorities.” (anonymous,
Michael Caughey (Bitcoin Step by Step)
Nonce Sense {Couplet} Once upon a time there lived a dyslexic dunce who was terrible atorthography. His special ed teachers added a nonce and now he's become a master at cryptography.
Beryl Dov
1. It must work. 2. It must be secure. 3. It should be as fast as reasonably possible. 4. It must be modular/extensible. 5. It must be easy to read/understand.
Joshua Davies (Implementing SSL / TLS Using Cryptography and PKI)
A specter is haunting the modern world, the specter of crypto anarchy. Computer technology is on the verge of providing the ability for individuals and groups to communicate and interact with each other in a totally anonymous manner. Two persons may exchange messages, conduct business, and negotiate electronic contracts without ever knowing the true name, or legal identity, of the other. Interactions over networks will be untraceable, via extensive rerouting of encrypted packets and tamper-proof boxes which implement cryptographic protocols with nearly perfect assurance against any tampering. Reputations will be of central importance, far more important in dealings than even the credit ratings of today. These developments will alter completely the nature of government regulation, the ability to tax and control economic interactions, the ability to keep information secret, and will even alter the nature of trust and reputation.
Peter Ludlow (Crypto Anarchy, Cyberstates, and Pirate Utopias)
The best random keys are created by harnessing natural physical processes, such as radioactivity, which is known to exhibit truly random behavior. The
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
necessity is the mother of invention, then
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
Rejewski had no idea of the day key, and he had no idea which message keys were being chosen, but he did know that they resulted in this table of relationships. Had
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
I pressed him gently on the matter, but he seemed a little reticent, which is maybe what you’d be wise to expect from a cryptologist who was also a practicing hermeticist.
Mark O'Connell (To Be a Machine : Adventures Among Cyborgs, Utopians, Hackers, and the Futurists Solving the Modest Problem of Death)
In fact, Britain had captured thousands of Enigma machines, and distributed them among its former colonies, who believed that the cipher was as secure as it had seemed to the Germans. The British did nothing to disabuse them of this belief, and routinely deciphered their secret communications in the years that followed. Meanwhile,
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)