Secret communication and cryptologic history: a challenge for Digital Humanities

Authors

DOI:

https://doi.org/10.23925/1984-3585.2020i21p146-165

Keywords:

Secrecy, Encryption, Cryptanalysis, Cybersecurity, Misrepresentation

Abstract

It may seem paradoxical to study communication from the vantage point of secrecy, but arguably keeping is as important as sharing. For centuries, cryptologic history was about languages and translation, writing and interpretation, though since the 1940s it relies much more on math and computing. Digital culture in the 21st century relies on encryption for trustworthy and verifiable communications among people and their banks, doctors, lawyers, business partners. Addressing the stakes of encryption today requires a critical appreciation of its misrepresentations - Digital Humanities are invoked when we apply data-science methods to aesthetic communication, so why not when we apply Humanities methods to digital culture? Despite Galloway’s warning that in parsing and processing quantitative information, “a cultural worker who deploys such methods is little more than a lesser Amazon or a lesser Equifax”, Digital Humanities need to help bridge the gulf between quantitative and qualitative approaches. This paper lays out the course design for, and teaching experiences with, a class that introduces students in the humanities to the history of cryptology. Covering secret communication from ancient times to today, the paper also surveys how media portray computer networks and cybersecurity issues.

Author Biographies

Peter Krapp, University of California, California, United States

Professor and Chair of the Department of Film and Media Studies at the University of California, Irvine. He has taught at the University of Minnesota and Bard College and has been a Visiting Researcher at Universities in South Africa, Germany, Brazil, the United States, and Taiwan. He is the author of the books "Déjà Vu: Aberrations of Cultural Memory" (2004) and "Noise Channels: Glitch and Error in Digital Culture" (2011).

Eduardo Harry Luersen, University of the Rios dos Sinos Valley, Rio Grande do Sul, Brazil

PhD in Communication Sciences at UNISINOS (2020), with CNPQ scholarship. Sandwich PhD at the Centre for Digital Cultures at Leuphana Universität Lüneburg (2019/1), with a Capes/DAAD scholarship. Master's degree in Social Communication at PUCRS (2013), with a CAPES scholarship. Graduated in Visual Arts: Bach. Graphic Design by UFPel (2010), with a CLMD scholarship at this University. Interrupted undergraduate studies in Music: Bach. Composition, at UFPel (2014-2015). He is founder of the collective Polvö, which works with sound and audiovisual installations. 2014-2015: Sound designer and composer for audiovisual productions at Cusco (audio production company), in Pelotas. 2013-2014: Teacher/researcher at Núcleo de Produção e Tecnologia Educacional, for the e-Tec Network, at IFSUL, in Pelotas. 2013: Artworker at Diário Popular newspaper, in Pelotas. 2011-2012: Layout editor and text reviewer for the journal Sessões do Imaginário, at PUCRS, in Porto Alegre. 2010: Technical level teacher at Sociedade Educacional Três de Maio, in the discipline of Digital Image. 2008-2010: Art director and co-owner of the strategic design studio Tentáculo, in Pelotas. 2007-2008: Designer at UFPEL, Pelotas.

References

BAMFORD, James. The puzzle palace: inside the National Security Agency. New York: Penguin, 1982.

BAUER, Craig P. Secret history: the story of cryptology. Boca Raton: CRC Taylor & Francis, 2013.

BAUER, Craig P. Unsolved! The history and mystery of the world's greatest ciphers from Ancient Egypt to online secret societies. Princeton: Princeton University Press, 2017.

BAUER, Friedrich L. Decrypted secrets: methods and maxims of cryptology. Berlin: Springer, 2007.

CLEMENS, Raymond. The Voynich Manuscript. Yale: Yale University Pree, 2016.

DIFFIE, Whitfield; LANDAU, Susan. Privacy on the line: the politics of wiretapping and encryption. Cambridge: MIT Press, 2007.

GALLOWAY, Alexander. The cybernetic hypothesis. Differences: a journal of feminist cultural studies, n. 25, v.1, 2014, p. 107-130.

GLASS, Darren. A first-year seminar on cryptography. Cryptologia, n. 37, v. 4, 2013, p. 305-310.

KAHN, David. The codebreakers: the story of secret writing. New York: Macmillan, 1967.

KACKMAN, Michael. Citizen spy: television, espionage, and Cold War culture. Minneapolis: University of Minnesota Press, 2005.

KAUR, Manmohan. Cryptography as a pedagogical tool, PRIMUS, v. l8, n. 2, 2008, p. 198-206.

KOBLITZ, Neal. Cryptography as a teaching tool. Cryptologia, n. 21, 1997, p. 317-326.

KOBLITZ, Neal. Secret codes and online security: a seminar for entering students. Cryptologia, n. 34, 2010, p. 145-154.

KOSS, Lorelei. Writing and information literacy in a cryptology first-year seminar. Cryptologia, n. 38, 2014, p. 223-231.

KURT, Yesem. Deciphering an undergraduate cryptology course. Cryptologia, n. 34, v. 2, 2010, p. 155-162.

LEVY, Stephen. Crypto. London: Penguin Books, 2001.

MACRAKIS, Kirstie. Prisoners, lovers, and spies: the story of invisible ink from Herodotus to al Qaeda. Yale: Yale University Press, 2014.

SCHMEH, 2015. Klaus Schmeh’s List of Encrypted Books – Klausis Krypto Kolumne. Disponível em: scienceblogs.de/klausis-krypto-kolumne/klaus-schmehs-list-of-encrypted-books. Acesso em: 6 abr. 2020.

SCHNEIER, Bruce. Secrets and lies: digital security in a networked world. Indianapolis: Wiley, 2004.

SINGH, Simon. The code book: the science of secrecy from Ancient Egypt to quantum cryptography. New York: Anchor Books, 1999.

PEW RESEARCH CENTER. Younger Americans express more support for encryption than older adults. 2017a. Disponível em: pewresearch.org/internet/2017/01/26/3-attitudes-about-cybersecurity-policy/pi_01-26-cyber-03-00. Acesso em: 6 abr. 2020.

PEW RESEARCH CENTER. Cybersecurity Knowledge Quiz. 2017b. Disponível em: pewresearch.org/internet/quiz/cybersecurity-knowledge. Acesso em: 6 abr. 2020.

QUISQUATER, Jean-Jacques et al. How to explain zero-knowledge protocols to your children. In: BRASSARD, Gilles. (ed.) Advances in cryptology. Crypto 89, LNCS 435, 1990, p. 628-631.

WINKEL, Brian. Lessons learned from a mathematical cryptology course. Cryptologia, n. 32, v. 1, 2008, p. 45-55.

Published

2020-12-14