Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Privacy Books Media Book Reviews

Crypto 29

Steven Levy's Crypto is a brief history of the men involved in developing modern cryptography. If you've read Applied Cryptography or another work with a mathematical emphasis on crypto, you've heard their names -- Diffie, Hellman, Chaum, Rivest, Shamir, Adleman, Zimmermann, and so forth. But the other books on cryptography typically neglect the human side in favor of the math. Crypto aims to fill that hole.

Crypto
author Steven Levy
pages 356
publisher Viking/Penguin
rating 9/10
reviewer Michael Sims, drfalken, topeka
ISBN 0-670-85950-8
summary A history of the people involved in developing modern cryptography

*

Several people were interested in reviewing this book. We try to be accomodating, so this is a mega-review by myself and slashdot readers drfalken and topeka. I'll try to be brief.

Michael's review:

I didn't expect to like Crypto. I was frankly put off by the subtitle on the front cover: "How the Code Rebels Beat the Government -- Saving Privacy in the Digital Age." Every time I send an unencrypted email (because none of my correspondents use encryption, because it isn't built-in) or think about the law (CALEA) which requires my ISP and telephone company to accomodate the government in wire-tapping my communications, I realize that this just isn't true. While the cryptographers thought they were winning battles, the government has so far been winning the war. From the sub-title, I expected the book to be a rah-rah cheerleading history of these noble crypto-knights wielding their ciphersabers with gleeful abandon against the fascist, corrupt, and evil Big Brother.

It turns out to be a much better book than I had expected. The author has collected most of his information through personal interviews, and it ends up being a very readable and very personal account of the past 30 years of cryptographic research and commercial development -- both in the public sphere, and, to some extent, in U.S. and British intelligence agencies. The author treats his subjects fairly - the government is not demonized as I expected, and the cryptographers are not idolized (much). There is essentially no math in this book, beyond the bare minimum necessary to understand the main concepts of cryptography. Together with, say, The Codebreakers for early history and Applied Cryptography for the math, it would make a comprehensive and thorough look at the history and science of cryptography.


drfalken's review:

The ubiquity of encryption technology employed by everything from bank machines to e-tailers is now taken for granted. Most people fail to realize, though, the profound impact that this component of the digital world has had on the Information Age. Illumination of this point is the formidable task of Crypto.

The renowned author of Hackers and Insanely Great remains true to form, transforming an obscure, dry and complex subject into an addictive page-turning thriller. He takes us from the hippie culture of academic math research in the 70s, through the dark underworld of government intelligence, into the development of the modern information age. Each step emphasizes the central conflict of the story: American national security vs. the right to individual privacy.

While this conflict has largely been resolved, the story contains important lessons that can be applied to the contemporary struggles over technologies like DeCSS and peer-to-peer media 'sharing.' Levy doesn't make any such connections in the book, but it is impossible to read Crypto without seeing how history is repeating itself in these other areas. This makes Crypto and important book to read. Everyone from the RIAA to 2600 subscribers can learn a lot from this well organized retelling of the past 30 years of crypto history. There's a certain futility involved in trying to put the genie of progress back in a bottle. There's also a case to be made for the management of progress so that it is used with the greatest benefit and smallest detriment to all. Perhaps the most remarkable revelation in the book is how the adversarial nature of 'the geeks' vs. 'the spooks' allowed for the maturation of a sensitive technology in a safe and thoughtful manner.

Anyone who has read Wired or Newsweek over the past 5 years will have read excerpts from Crypto. Levy spent a long time researching this book, which makes sense considering the story he is telling is one that was developing during his period of research. Many of the events he recounts are ones he covered as a journalist at the time that they happened. Some time spent in the Wired archives shows the extent to which he has been one of the journalists closest to the crypto revolution since the release of PGP and the popularization of the Internet.

The book begins with the story of Whit Diffie and his wild ambition to simply learn more about the black art of electronic cryptography. In the early 70s the government monopoly on information relating to serious crypto was nearly complete. Coming from the mindset of the Open Source community, Levy's tale of the early crypto research climate describes a cathedral that makes Microsoft look like the Debian project. The resulting story, therefore, highlights the magnificence of the public key breakthrough, the boldness of the RSA discovery and the daring of Paul Zimmermann's PGP.

If you're looking for a history of Cryptography, get The Code Book by Simon Singh, or Codebreakers by David Kahn instead of this book. Crypto is a contained story dealing exclusively with the American Cryptographic Experience from Diffie-Hellman, through RSA, and PGP. It is effectively a collection of short, intertwined biographies of the saviors of privacy, from Adleman to Zimmermann. This is not to say that Levy ignores the math; on the contrary, his explanation of the magnitude of the public key concept hits home even harder than the impressive work by Simon Singh.

Especially in light of recent Slashdot stories, Crypto is highly recommended, for novices and Cypherpunks alike. It's a coming of age story for American technology, and a great addition to the bookshelf of modern American history.


topeka's review:

The first time I heard the term "elegant" applied to a technical problem was a bit of a revelation for me. Until then, elegance, to me, was a visual quality that could only be achieved by painters and poets. When I began to see the elegance in solutions to technical and mathematical problems, I was hooked into a world of intellectual curiosity. Cryptography immediately filled the mold of a highly complex and technical problem with a beautiful and elegant solution when it was first explained to me several years ago. The idea clicked again when I read Raymond's The Cathedral and the Bazaar and equated that elegance to "scratching a particular itch". This intellectual curiosity seems to drive the open source community.

However, in 1967, when James Ellis (of the secret British agency, GCHQ) first came up with the idea of public key cryptography, his theory was buried. Until then, solutions to cryptographic problems were a dirty process. If it was easy to create a cipher, than it was just as easy to break it. As such, Ellis's breakthrough was simply too pretty to be trusted and as a result, it lay locked away until 1997. Steven Levy's new book, Crypto is the story of the individuals who transformed cryptography from a dirty art, which only the most elite governments dabbled in, to an elegant mathematical solution available to the public in hundreds of different forms. It was all done by a community of individuals who preached openness and sought out clean solutions to tough, technical problems.

Levy starts out his story in the same place as he started with an earlier famous work, at the Massachusetts Institute of Technology. He narrates the story of Whitfield Diffie, the co-creator of public key cryptography. Starting in 1969 as Diffie sought shelter from the Vietnam war working for a defense contractor, Levy discusses Diffie's transformation from examining ideas about cryptography as merely a hobby, to an all out obsession. Diffie is transformed from a man thinking about cryptography on the weekends to a man criss-crossing the country in one run-down Datsun after another, searching for any and every piece of information about cryptography. Diffie would not broach the wall of cryptography until he was pointed to another researcher in California, who seemed to be investigating the same concepts. Levy chronicles the fateful partnership that occurred with Marty Hellman and the subsequent invention of public key cryptography, at least its theory.

At this time, there were few works published on the subject of cryptography. In fact, only government agents and a few privileged defense contractors were able to expend meaningful resources on crypto research. It seems that while Levy's work is a story of the people who waged a war to bring crypto to the public, it is also the story of that wars' enemy, the National Security Agency. The cryptography bureaucracy, gaining most of its resources during the Second World War, had built quite a palace around anything that involved codes. In the years to come, the NSA would fiercely defend its position of strength. From its early attempts to classify David Kahn's famous work, The Codebreakers, to its involvement in the creation of the Digital Encryption Standard and its invention of the Clipper Chip. As Crypto defines it, the spooks were able to keep their lock on cryptography by invoking a mentality of "if only you knew what I know..." in classified briefings to politicians and contract negotiations with defense contractors like IBM. What the NSA never expected, was for anyone to try and find out what it was that they knew. With the publishing of the Diffie-Hellman paper, "New Directions in Cryptography," one of the NSA's most viable opponents would begin their work where Diffie and Hellman's theories left off, implementation.

Ron Rivest, Adi Shamir and Leonard Adleman, through a four-month period of intense brainstorming, would eventually implement and patent the Diffie-Hellman concept of public key cryptography while working as faculty at MIT. As Levy chronicles it, the algorithm, which would become popularly known as RSA, was named for the order in which each mathematician gave to the project. Rivest, who spearheaded the search for the implementation was listed first and Adelman, who merely poked holes in Rivest and Shamir's proposals, had to be convinced that he had even contributed enough to the project to be listed on the paper. Until this point, the description of cryptographic algorithms in scientific texts had always been done using letters of the alphabet to depict members in a cryptographic exchange. The creators of RSA introduced the now famous cryptographic characters, Alice, Bob and the unruly Eve, to describe their new breed of algorithms. Levy is able to highlight the mentality of the three mathematicians, some of which at first, thought the problem was nothing more than a clever puzzle and too grounded in the real world to be successfully dealt with by mathematicians. He shows their transformation to the church of cryptography, as the elegance of the new algorithms would prove as beautiful as the theorems of Gauss and Euclid.

The story continues with RSA Data Security, the vehicle Rivest would use to commercialize his algorithm. To talk about RSA Data Security is to talk about patent use. Both the Diffie-Hellman algorithm, as well as RSA, were actually patented by Stanford University and MIT, respectively. When the patents were granted, those Universities then had the option to either free the patents or restrict them. As history has painfully shown, they did not choose to free them. RSA Data security was built on this decision -- an MIT patent. It was sometimes difficult to read this section of the book with the same exuberance that Levy writes about it. Nonetheless, it is a reminder of the state of our intellectual property laws today in the United States.

Levy's narration eventually leaves the story of RSA to tell that of Phil Zimmerman, someone who could rightly be called a crypto-anarchist. Once again we are treated to an in depth discussion of the motivation that created Pretty Good Privacy. Levy contrasts the use of legal patents by RSA Data Security to bring encryption to the masses, to the complete ignorance of them by Zimmerman in his creation of PGP to achieve the same goal.

Finally, in my favorite section of the book, Levy discusses the controversy that surrounded a device known as the Clipper Chip. It was originally invented by the NSA as a complete key-escrow system, named the Capstone Chip. Later, as AT&T attempted to market the first encrypted telephone device, the Capstone chip became the Clipper Chip as the FBI and other Executive branch officers rushed to implement a brain-dead subset of the original system before the AT&T device made it to market. An entirely amusing fiasco, Levy lays the entire story out from beginning to end.

Lastly, includes an epilogue telling the story of the British agents at GHCQ, who beat Whitfield-Diffie and RSA -- a story that the GCHQ refused to let surface until the mid 1990s.

Levy tells a story about people. If you are looking for a technical discussion of the different aspects of cryptography then you would be better off with Schneier's Applied Cryptography or Singh's The Code Book. However, to understand the freedom that cryptographic technologies bring us, we must understand the history that it stands on. This is what Levy provides. A comprehensive history of the events that took cryptography out of the hands of the NSA and into the hands of political dissidents, CEOs, Nazis, you and me (not to mention mozilla, pgp, ssh, and gpg).


You can purchase Crypto at ThinkGeek.

This discussion has been archived. No new comments can be posted.

Crypto

Comments Filter:
  • by Anonymous Coward
    Even if practical quantum computation is just around the corner, which is probably isn't, most researchers think that thermalization and decoherence will prevent quantum computers from achieving the Shor-style reduction of exponential time algorithms to polynomial. The future of quantum computing is probably in more modest gains like Grover's algorithm.
  • by Anonymous Coward
    If you wish to pour over algorithms

    I've often wondered, what tastes best poured over a fine encryption algorithm? Heinz? Thousand Island? Or some white wine?

    • The resulting story, therefore, highlights the magnificence of the public key breakthrough, the boldness of the RSA discovery and the daring of Paul Zimmermann's PGP.
    I presume you mean Phil Zimmermann [hush.com], eh? ;)

    Alex Bischoff
    ---
  • You're mixing theory and implementation. James Ellis essentially discovered the first public key crypto scheme in 1967 (it was basically RSA), but the idea was kept inside GCHQ. Diffie, Helman, R, S, and A all came up with PK systems in the 1970's, nearly 10 years later, but their systems were the first to be published. PGP was important because Zimmerman implemented PK crypto so that just about anyone could use it.
  • Was just playing with pgp Outlook plugin (because you need the paid version of Eudora to use pgp plugin) - pretty much a nobrainer to install, make your keys and publish the public one somewhere.

    The real challenge was getting it to work thru a proxy server, but that turned out to be trivial too.

    email your secrets to: chuck@schiller.tzo.com
    key at pgpkeys.mit.edu
  • I read it two days ago. I thought the narrow
    topic wouldn't last 300 some pages, but the
    personalities of the participants were fascinating.
    It is the classic case of big-brother versus
    individual genius. Not one instance, but over
    and over again as the NSA/CIA pulls the wool over
    our eyes.
  • Steven Levy is not only an excellent journalist but he's a very fine book writer. This is a rare combination. I learned a great deal from Crypto, and of course still have the original edition of Hackers, but I still think my favorite is Artificial Life because it made an obscure topic I had little interest in much more relevant.

    I strongly recommend reading Whit Diffie and Susan Landau's excellent Privacy on the Line in conjunction with Steven's book. And Simon Singh's book is another good companion, since it has much more of the pre-World War II history of crypto and secret writing.

    We are very fortunate that someone like Whit Diffie did the right thing technically for the right reasons ethically. It is making a huge difference.

    -------
  • What does your sig mean? I'm sure I've seen it somewhere as some kind of mneumonic but I can't put my finger on it.

    --

  • oh, crap. I just remembered. It's Pi.

    (*slap!* stupid! stupid!)

    --

  • I read Crypto last weekend. I couldn't put it down, thanks to it being so entertaining, offering an exciting peek into the lives and personalities of the Crypto-elite. It wasn't without its flaws though. It had a bunch of annoying errors (at times, one per every 10 pages or so) that could have been caught by a more thorough proofreading and it didn't describe the technology as much as I would have liked.
  • I did mean Phil. And stand corrected. When I proof read my review I missed that...I was too busy concentrating on how to spell his last name.

    Thanks.

    Elliot.
    ----------------------------
  • I started The Codebreakers [amazon.com] yesterday and have made it 150 pages in. It is slow going but I'm finding it pretty rewarding. It's an issue of being overwhelmed with minutiae. I understand that you need that sort of thing if you are writing the 'definitive' anything, but Khan seems to extend it down to the narrative as well. It's kind of unnecessary to know the exact details of how the US and Japanese governments worked prior to Pearl Harbor when the point of the story is to discuss the code making and breaking efforts surrounding the event.

    I expect to be finished by the end of next month (if I'm lucky).
    ----------------------------
  • "addictive page-turning thriller"

    I wish it were so. I'm reading the book right now, actually, and although the information contained in it (especially the many funny anecdotes about the development of public key crypto) is absolutely fascinating, the book itself is not that well written, IMHO. I haven't ready the author's earlier works, but compared to other true-life-drama books (and I'm thinking particularly of _When Genius Failed_ which I also just read) it falls a bit short. Most of the outcomes are heavily foreshadowed, and for those of us who know which algorithms are now widely used, there is little to no suspsense.

    Still, an enjoyable book - just not as good as the reviews make it out to be.

  • it's a mnemonic for Pi. it's also an extremely insightful statement on its own, I believe ;-)
  • by wunderhorn1 ( 114559 ) on Thursday March 15, 2001 @06:51AM (#361797)
    Today's Philadelphia Inquirer had a good article [philly.com] on PGP, including quotes from Phil Zimmermann.

    "We've had trouble getting PGP employed across the breadth of society," Philip Zimmermann, the inventor of PGP, lamented. "There needs to be more consciousness raised about privacy, but ease of use certainly has been a factor."

    It's always good to see this getting public exposure, and they did a good job of raising the standard privacy concerns (doctors and patients need privacy and therefore encryption, for one), although the article wasn't as enthusiastic about encryption as I would have liked.

  • However, in 1967, when James Ellis (of the secret British agency, GCHQ) first came up with the idea of public key cryptography, his theory was buried... ...Ellis's breakthrough was simply too pretty to be trusted and as a result, it lay locked away until 1997

    This reads as if PK cryptography wasn't public knowledge until '97. This isn't the case, of course, as those of us who followed Phil Zimmerman's excellent work from '91 (first PGP release, IIRC) onwards.

  • my grandfather...told me precisely nothing about what they did there. The only story he ever related ...

    My grandfather worked in counter-intelligence for the US in Berlin during the beginning of the Cold War. He only told me two stories before he passed (last year).

    The first, regarded the capture of an East German spy in the US-controlled area of Berlin. The spy was attempting to recruit during the interrogation -- even though he was treated to smokes instead of the firing squad if the roles had been reversed. That particularly incensed my granddad. Oh, and I learn from his story that they did indeed have underground "city" with car-sized elevators in residential garages.

    The second story was about planting a bug in an apartment shared by a US Colonel and a known East German spy (female). Anyway, they sent a team in while the couple went to dinner (why bother going out? Anyway...) and since the woman had a dog the team brought a piece of steak to calm it down. Turned out the dog was friendly. Upon leaving the apartment and checking that everything was back in place they signalled to drop back from following the couple. Minutes later the team screamed to regain contact -- they forgot the steak! "Hunny, did you put that steak there or are we being watched?"

    That's it. Oh, he did describe the inside of the regional FEMA nuke hide out -- that only he and not even my grandmother had access to in case of nuclear attack. I remember that everything was on springs -- including the pictures (they had pictures on walls for use when everone topside would fry? Enjoy that Van Gough!) and the toilets.

    It must be the culture. He just didn't talk about his experiences. As far as I know those secrets made it undiscovered to the grave with him.

    Oh, damn you, Hassen.

  • Yours is a pretty unenlightened comment. This book does not aim to teach crypto, it aims to teach the history of crypto over the past 50 years. If you wish to pour over algorithms, this is not your book. If you enjoy history, especially history that is relevant to your life, this is a book you will enjoy.
  • I guess I'll drop that idea now ;) Anyway, I think the reviewers missed out on a couple of things I found most interesting:

    1. Prof Donald Knuth (of Art of Computer programming [stanford.edu] fame) suggested to Diffie that a possible one way function was factoring, but Diffie and Hellman didn't pursue this strategy and it was independently discovered by Rivest, Shamir and Alderman.
    2. Prof Larry Hoffman [purdue.edu] was presented with Merkle's paper containing the first ever public realisation of a Public Key system, but couldn't understand the maths involved, so ignored it!
    3. Ericsson turned down the offer to buy ownership of RSA.

    If you haven't got this book, and you're interested in crypto then I'd highly recommend it. It mentions the contributions of virtually every well known personality involved with modern cryptography: Tuchman, Horst Feistel, Coppersmith, Rivest, Diffie, Hellman, Chaum, Meyer, Gilmore, Schnorr, Eli Biham, Bruce Schneier, Jeff Schiller, Adam Back, Daniel Bernstein, Matt Blaze, Dorothy Denning, PRZ etc etc etc

    I've read most decent crypto books, and Crypto is like a more up to date version of The Code by David Kahn...Coverage on the NSA follows neatly on from Bamfords The Puzzle Palace.

  • by General_Corto ( 152906 ) on Thursday March 15, 2001 @06:38AM (#361802)
    To quote:
    However, in 1967, when James Ellis (of the secret British agency, GCHQ) first came up with the idea of public key cryptography, his theory was buried.
    As far as I know, GCHQ has never been a 'secret' agency; that dubious honour was reserved for MI5 and MI6 (not that it worked or anything). In fact, there are signposts directing you to GCHQ all around Cheltenham where they are based.

    As a side note, my grandfather worked for GCHQ for many, many years as a computer operator and programmer, both in the UK and Hong Kong, and of course he told me precisely nothing about what they did there. The only story he ever related to me was regarding a mainframe training course they went on at Lucas Engineering for some IBM beast of a machine. More interesting than the humorous anecdote related there (the instructor telling my grandfather "please don't speak the hallowed name of Thomas J. Watson while urinating") was the fact that GCHQ was behind the curve on the hardware front when compared to British industry; the whole reason for going to Lucas was that they already had the mainframe themselves.

    I'm sure he had many more, and better, stories. Unfortunately, He's no longer with us to share them.
  • by sid_vicious ( 157798 ) on Thursday March 15, 2001 @08:18AM (#361803) Homepage Journal
    While I really enjoyed the book, there were a few eyerollers in it... in the first chapter, he says something along the lines of (NOT a direct quote - I loaned my copy out):

    "Mary didn't like Whitfield Diffey. But she just hadn't decoded him yet."

    ... that just made me wanna puke. Fortunately, there were very few of those types of lines in there.

    That being said, the book was a great read. Don't buy it if you want an in-depth analysis of modern crytography -- it is NOTHING of the sort. You basically get the soap opera that went into the making of public key -- RSA vs. NSA, RSA vs. Phil Z., Phil Z. vs. the world.

  • What was the very original reason for cryptography? Was it so that the enemy would not know our plans? I have been in military intelligence (I know it's an oxymoron) and have encountered the reasons that cryptography exists. I also understand why the government "taps our phone lines". I have lived in several countries and have found that, with all of it's flaws, I like living in the good ole USA the best.
  • Why is everybody dealing with crypto when it's only real use is for terrorists and peadophiles to hide they're nefarious activities.

    What worries me is that crypto will become accepted by the public, making it harder for law enforcement officials to find the criminals before they hurt innocent people

    In case you haven't noticed this is a troll :-)

  • Eudora Light 3.x.x can use plugins, at least on the Macintosh edition. I use PGP with 3.1.3 all the time.
  • To rate the reviewers, I think Michael's comments were redundant and didn't add anything to the main two reviews. drfalken's was a good review, and topeka gave a good (longish) summary of the book though neglected to mention my favorite bit, the cypherpunks [berkeley.edu].

    It is an enjoyable read, a light quick read in the genre which might be described as "group biography". Similiar to Hackers.

    I would describe it as a light-weight version of a book that picks up where The Codebreakers by David Kahn left off. Following the events myself since the early 90's I found I learnt a pleasant amount about the people, making the topic more humane as opposited to a technical or flamewar discussion.

  • i just finished reading Crypto myself, and must say that i rather enjoyed it. the book makes for a good book to read on your commute, as it is a pretty straightforward read, but does include the requisite level of technicality to explain some underlying concepts. Steven Levy is very good at doing this, as he did in Hackers & Insanely Great. The book, over all, is worth reading if you don't know whether or not to learn more about cryptography or if you simply want to brush up on your history of the American cryptographic revolution.
  • by deran9ed ( 300694 ) on Thursday March 15, 2001 @09:10AM (#361809) Homepage

    In fact, only government agents and a few privileged defense contractors were able to expend meaningful resources on crypto research.
    Apparently he may have not known where exactly to look for information, cryptographic published articles were rare, and due to the time frame with no internet, it doesn't mean that they weren't available, solely harder to come across. There are documents dating back to ancient Egyptian times regarding crytpo, its the mathematics I guess is what may have been meant here.

    it is also the story of that wars' enemy, the National Security Agency. The cryptography bureaucracy, gaining most of its resources during the Second World War, had built quite a palace around anything that involved codes.
    This is likely to be Venona and what took place with the Enigma machines. Government of course is going to attempt to be the fundamental leader in technology at this time, as it is a highly stressful time of war, and the NSA was trying to gain ground on the Germans, to think they're the enemy is a bit of a misstatement, sure we can hate them, but the NSA is solely doing what they're told.

    spooks were able to keep their lock on cryptography by invoking a mentality of "if only you knew what I know..." in classified briefings to politicians and contract negotiations with defense contractors like IBM.
    Sorry to say, but in order to give a fair and just look at the whole scenario I would have preferred non "tech-racist" terms such as a spook. Sure we know what a spook is (those into security and technology), but to judge an agency while writing a book shows a dislike for government, and while I like them as much as I like mad cow disease, I think some views may be biased, which is not a fair rendition of the full spectrum of it all.

    I just think I'll go out and buy the book for clarity's sake instead of rambling on.

    CIA vs. Soviets [antioffline.com] (top secret declassified docs)
  • I haven't read Crypto.. but I did recently read Neal Stephenson's Cryptonomicon. A big fat book but worth reading if you want a gripping story with lot's of crypto references thrown in.

  • I read Crypto two months ago and breezed through it in two days. It was an easy read compared with The Codebreakers, which I am still reading (and have been, on and off, for six months).

    While I like both of them I think that Crypto is much more accessable. Hopefully non-techies will read it and the interest in crypto will grow. I think the biggest problem right now is that most people don't understand how crypto can help them.

    Has anyone else finished reading The Codebreakers? How do the two compare where their accounts overlap?

One man's constant is another man's variable. -- A.J. Perlis

Working...