Secret communication and cryptologic history: a challenge for Digital Humanities
DOI:
https://doi.org/10.23925/1984-3585.2020i21p146-165Keywords:
Secrecy, Encryption, Cryptanalysis, Cybersecurity, MisrepresentationAbstract
It may seem paradoxical to study communication from the vantage point of secrecy, but arguably keeping is as important as sharing. For centuries, cryptologic history was about languages and translation, writing and interpretation, though since the 1940s it relies much more on math and computing. Digital culture in the 21st century relies on encryption for trustworthy and verifiable communications among people and their banks, doctors, lawyers, business partners. Addressing the stakes of encryption today requires a critical appreciation of its misrepresentations - Digital Humanities are invoked when we apply data-science methods to aesthetic communication, so why not when we apply Humanities methods to digital culture? Despite Galloway’s warning that in parsing and processing quantitative information, “a cultural worker who deploys such methods is little more than a lesser Amazon or a lesser Equifax”, Digital Humanities need to help bridge the gulf between quantitative and qualitative approaches. This paper lays out the course design for, and teaching experiences with, a class that introduces students in the humanities to the history of cryptology. Covering secret communication from ancient times to today, the paper also surveys how media portray computer networks and cybersecurity issues.References
BAMFORD, James. The puzzle palace: inside the National Security Agency. New York: Penguin, 1982.
BAUER, Craig P. Secret history: the story of cryptology. Boca Raton: CRC Taylor & Francis, 2013.
BAUER, Craig P. Unsolved! The history and mystery of the world's greatest ciphers from Ancient Egypt to online secret societies. Princeton: Princeton University Press, 2017.
BAUER, Friedrich L. Decrypted secrets: methods and maxims of cryptology. Berlin: Springer, 2007.
CLEMENS, Raymond. The Voynich Manuscript. Yale: Yale University Pree, 2016.
DIFFIE, Whitfield; LANDAU, Susan. Privacy on the line: the politics of wiretapping and encryption. Cambridge: MIT Press, 2007.
GALLOWAY, Alexander. The cybernetic hypothesis. Differences: a journal of feminist cultural studies, n. 25, v.1, 2014, p. 107-130.
GLASS, Darren. A first-year seminar on cryptography. Cryptologia, n. 37, v. 4, 2013, p. 305-310.
KAHN, David. The codebreakers: the story of secret writing. New York: Macmillan, 1967.
KACKMAN, Michael. Citizen spy: television, espionage, and Cold War culture. Minneapolis: University of Minnesota Press, 2005.
KAUR, Manmohan. Cryptography as a pedagogical tool, PRIMUS, v. l8, n. 2, 2008, p. 198-206.
KOBLITZ, Neal. Cryptography as a teaching tool. Cryptologia, n. 21, 1997, p. 317-326.
KOBLITZ, Neal. Secret codes and online security: a seminar for entering students. Cryptologia, n. 34, 2010, p. 145-154.
KOSS, Lorelei. Writing and information literacy in a cryptology first-year seminar. Cryptologia, n. 38, 2014, p. 223-231.
KURT, Yesem. Deciphering an undergraduate cryptology course. Cryptologia, n. 34, v. 2, 2010, p. 155-162.
LEVY, Stephen. Crypto. London: Penguin Books, 2001.
MACRAKIS, Kirstie. Prisoners, lovers, and spies: the story of invisible ink from Herodotus to al Qaeda. Yale: Yale University Press, 2014.
SCHMEH, 2015. Klaus Schmeh’s List of Encrypted Books – Klausis Krypto Kolumne. Disponível em: scienceblogs.de/klausis-krypto-kolumne/klaus-schmehs-list-of-encrypted-books. Acesso em: 6 abr. 2020.
SCHNEIER, Bruce. Secrets and lies: digital security in a networked world. Indianapolis: Wiley, 2004.
SINGH, Simon. The code book: the science of secrecy from Ancient Egypt to quantum cryptography. New York: Anchor Books, 1999.
PEW RESEARCH CENTER. Younger Americans express more support for encryption than older adults. 2017a. Disponível em: pewresearch.org/internet/2017/01/26/3-attitudes-about-cybersecurity-policy/pi_01-26-cyber-03-00. Acesso em: 6 abr. 2020.
PEW RESEARCH CENTER. Cybersecurity Knowledge Quiz. 2017b. Disponível em: pewresearch.org/internet/quiz/cybersecurity-knowledge. Acesso em: 6 abr. 2020.
QUISQUATER, Jean-Jacques et al. How to explain zero-knowledge protocols to your children. In: BRASSARD, Gilles. (ed.) Advances in cryptology. Crypto 89, LNCS 435, 1990, p. 628-631.
WINKEL, Brian. Lessons learned from a mathematical cryptology course. Cryptologia, n. 32, v. 1, 2008, p. 45-55.
Downloads
Published
Issue
Section
License
Esta revista oferece acesso livre imediato ao seu conteúdo de acordo com a licença CC BY 4.0, em conformidade com a definição de acesso público do Directory of Open Access Journals (DOAJ).
Ao submeter um texto à TECCOGS, os autores asseguram que o material submetido à avaliação e eventual publicação não infringe de modo algum qualquer direito proprietário ou copyright de outros. Com a submissão, o autor transfere em efetivo os direitos de publicação do artigo para a TECCOGS. A transferência de copyright cobre os direitos exclusivos de publicação e distribuição do artigo, incluindo reimpressões ou quaisquer outras reproduções de natureza similar, além de traduções. Os autores mantém o direito de usar todo ou partes deste texto em trabalhos futuros de sua autoria e de conceder ou recusar a permissão a terceiros para republicar todo ou partes do texto ou de suas traduções. Para republicar números da revista na íntegra, qualquer interessado precisa obter permissão por escrito tanto dos autores como também dos editores da TECCOGS. A TECCOGS por si só pode conceder direitos relativos a emissões de periódicos como um todo.
Imagens com direitos autorais pertencentes a terceiros, que não foram concedidos ao autor do texto, devem ser utilizadas somente quando necessárias à análise e ao argumento da pesquisa, sempre indicando as respectivas fontes e autoria. A TECCOGS dispensa o uso de imagens meramente ilustrativas. Se desejar ilustrar um conceito, o autor deve indicar, em forma de URL ou referência bibliográfica, uma referência em que a ilustração esteja disponível.
---------------------------------------------------------------------------------
This journal offers free immediate access to its content under CC BY 4.0, in accordance with Directory of Open Access Journals' (DOAJ) definition of Open Acess.
When submitting a text to TECCOGS, authors ensure that the material submitted for evaluation and eventual publication does not infringe any proprietary right or copyright. Upon submission, authors effectively transfer the publication rights of the article to TECCOGS. The copyright transfer covers the exclusive rights of publication and distribution of the article, including reprints or any other reproduction of similar nature, in addition to translations. Authors retain the right to use all or parts of the text in future works of their own, as well as to grant or refuse permission to third parties to republish all or parts of the text or its translations. In order to fully republish issues of the magazine, anyone interested must obtain written permission from both the authors and the editors of TECCOGS. TECCOGS alone can grant rights relating to issues of journals as a whole.
Images whose copyright belongs to third parties that have not been granted to the author of the text should be used only when essential for the analysis and argument, always indicating theirs respective sources and authorship. TECCOGS dismisses any use of merely illustrative images. To illustrate a concept, the author must indicate, in the form of a URL or bibliographic reference, a source in which the illustration is available.