Category Archives: History

Shiver me timbers

Remember that old joke about the octogenarian pirate? You know, the one who goes around saying “Aye-matey” (I’m eighty). Sorry, it’s not every day I get to put a pirate joke in a log entry. Speaking of log entries I was reading the ship log over at the 826 Valencia Store, and noticed a fascinating take on the risk of being a buccaneer versus the modern workman:

Compensation schedule

Arrgh, being a pirate was obviously risky, but not too risky a business.

It paid to be a southpaw, it would seem. And loss of one eye is listed, but what about two? I can see “capable one-eyed buccaneers” (pun intended) as a plausible explanation for the lower rate for pirate compensation, but what was the payout for being blinded?

And what would be the modern equivalent of the “favorite or lucky leader”?

Physics of terrorism patterns

Some clever scientists have reviewed current events to try and find a universal pattern to terrorism and published a paper with their results:

We report a remarkable universality in the patterns of violence arising in three high-profile ongoing wars, and in global terrorism. Our results suggest that these quite different conflict arenas currently feature a common type of enemy, i.e. the various insurgent forces are beginning to operate in a similar way regardless of their underlying ideologies, motivations and the terrain in which they operate. We provide a microscopic theory to explain our main observations. This theory treats the insurgent force as a generic, self-organizing system which is dynamically evolving through the continual coalescence and fragmentation of its constituent groups.

It looks like they were trying to prove the old adage that ideologies, motives and terrain do not impact methods used by insurgent forces. I think that would be useful as an elimination of factors that are often mistakenly assumed to influence method, rather than proof of universality. In other words, does the universality of a hammer as a tool for hammering surprise anyone? Does it matter if the people who use hammers for hammering spend their money on different causes?

More flyingpenguins

Whew. I just mowed through hundreds of spam comments.

I used to enjoy reading these crazy things as a sort of stream-of-conscious Kerouac-like review of our modern tendencies for consumption.

Call me crazy, but maybe someone should make this into performance art — read a spam filter to music and do an artistic interpretation of the messages:

stricken golf servicemen entrusting pads
oat sycophantic mortgages apprehensions
Teletext Jackie Seabrook contrition whacked pills
intoxicating geyser sandpaper Germania Amoco coriander treatise mortgages
home equity loan

Yeah, say it out loud man! Cool, daddy-o. Home equity loan…oh, home equity loan.

I admit it, I can sometimes really get into this stuff. I suppose I should dismiss everything but the sensible comments, yet there’s something oddly poetic and security-related in thinking about the hundreds of spam entries I get every day.

For example, remember the origins of public-key cryptography?

We know that secret communication still uses blind-drops and even steganography (someone posts a jpg on a free public site like flickr and then anyone else can download and decrypt), so there’s clearly intent out there. And we know that some serious time and money is spent listening to the noise from space. Wonder what would happen if we ran spam through some of the same analytics and filters. Would there be a hidden message? The meaning of life? Does it all add up to a magic number?

Maybe I’m just having too much fun thinking about it, when I could be out getting some sun like this little fellow:

Evil Penguineval

Ok, enough spam. I’m going to think about putting in some new controls.

Who invented public-key cryptography

I went to presentation yesterday where a speaker told the audience the tale of how the three guys from MIT invented public-key cryptography. You know, the RSA trio. I mentioned that they were not the sole inventors (hey, Diffie sits on the crypto panel at RSA for a reason) but was soundly shut-down.

After the presentation I did a little research to double-check and while I thought Diffie-Hellman and Merkle were important, I didn’t realize that another group actually pre-dated even their publication. It turns out that there is a paper from 1987 called The Story of Non-Secret Encryption written by James Ellis. This paper not only describes ground-breaking work done prior to Diffie-Hellman and Merkle, but it gives credit to Bell Labs in 1944 for helping instigate the modern public key cryptography concepts.

Source is available here: http://www.cesg.gov.uk/site/publications/media/ellis.pdf

A paper written by Clifford Cocks (November 20, 1973) called “A Note on Non-Secret Encryption” is also relevant.

Here’s a nice review of the actual history, as told by the Living Internet:

Ellis began thinking about the shared secret key problem in the late 1960’s when he discovered an old Bell Labs paper from October, 1944 titled “Final Report on Project C43”, describing a clever method of secure telephone conversation between two parties without any prearrangement. If John calls Mary, then Mary can add a random amount of noise to the phone line to drown out John’s message in case any eavesdroppers are listening. However, at the same time Mary can also record the telephone call, then later play it back and subtract the noise she had added, thereby leaving John’s original message for only her to hear. While there were practical disadvantages to this method, it suggested the intriguing logical possibility: there might be methods of establishing secure communications without first exchanging a shared secret key.

Ellis thought about this seemingly paradoxical idea for awhile, and while lying in bed one night developed an existence proof that the concept was possible with mathematical encryption, which he recorded in a secret CESG report titled The Possibility of Non-Secret Encryption in January, 1970. This showed logically that there could be an encryption method that could work without prior prearrangement, and the quest in GCHQ then turned to find a practical example.

The first workable mathematical formula for non-secret encryption was discovered by Clifford Cocks, which he recorded in 1973 in a secret CESG report titled A Note on Non-Secret Encryption. This work describes a special case of the RSA algorithm, differing in that the encryption and decryption algorithms are not equivalent, and without mention of the application to digital signatures. A few months later in 1974, Malcolm Williamson discovered a mathematical expression based on the commutativity of exponentiation that he recorded in a secret report titled Non-Secret Encryption Using A Finite Field, and which describes a key exchange method similar to that discovered by Diffie, Hellman, and Merkle. It is not known to what uses, if any, the GCHQ work was applied.

It just goes to show, don’t always believe what you hear in presentations…