Communication in the Presence of Adversaries
Communication in the Presence of Adversaries
This chapter provides an overview of the history of cryptographic technologies, periodized along successive “information ages.” It explains that the development of cryptographic techniques and devices in each period is driven by a dominant information and communication technology, such as telegraph, electromechanical computing, and networked computing. It also highlights the unarticulated dimensions of the cryptographic experience. These include the design trade-offs that seem to perpetually obtain between high-grade security and user-friendliness and the embodiment of cryptographic techniques in physical artifacts.
Keywords: cryptographic technologies, information ages, information and communication technology, telegraph, electromechanical computing, networked computing, high-grade security, user-friendliness
MIT Press Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.
Please, subscribe or login to access full text content.
If you think you should have access to this title, please contact your librarian.
To troubleshoot, please check our FAQs, and if you can't find the answer there, please contact us.