Skip to main content

Cryptographic Media

  • Living reference work entry
  • First Online:
Second International Handbook of Internet Research

Abstract

Cryptographic technologies have become an essential and even ubiquitous component of online infrastructure, yet they are rarely acknowledged outside of technical literatures. This chapter contributes questions about the impact of these technologies on daily life, and suggests five threads for future analysis: encryption, obfuscation and hiding, code, language, and epistemology. While each has a technical side, in this chapter they are presented at the intersections with society, politics, and culture. In many cases, revitalizing these intersections requires looking for historical examples, when for instance, prior to the twentieth century, the technologies and our understanding of them were more fluid and integrated with cultural and scientific pursuits. The common dimension running through this history and its revitalization is a conception of cryptography and its cognate technologies as “media”.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  • Berry DM (2011) The philosophy of software: code and mediation in the digital age. Palgrave Macmillan, New York

    Book  Google Scholar 

  • Brunton F (2014) Kleptography Radical Philosophy:2–6

    Google Scholar 

  • Brunton F, Nissenbaum H (2015) Obfuscation: a User’s guide for privacy and protest. MIT Press

    Google Scholar 

  • Chun WHK (2008) Control and freedom: power and paranoia in the age of Fiber optics. MIT Press, Cambridge, MA

    Google Scholar 

  • Churchhouse RF (2002) Codes and ciphers: Julius Caesar, the enigma, and the internet. Cambridge University Press, Cambridge

    Google Scholar 

  • Cocks CC (1973) A Note on “Non-Secret Encryption”. https://www.gchq.gov.uk/notenon-secret-encryption

  • Cole E (2003) Hiding in plain sight: steganography and the art of covert communication. Wiley, Indianapolis

    Google Scholar 

  • Cox G, McLean A, Berardi F “Bifo” (2012) Speaking code: coding as aesthetic and political expression. MIT Press, Cambridge, MA

    Google Scholar 

  • Cramer F (2005) Words made flesh: code, culture, imagination. Piet Zwart Institute, Rotterdam

    Google Scholar 

  • Diffie W (1988) First ten years of public-key cryptography. Proc IEEE 76:560–577

    Article  Google Scholar 

  • Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Trans Inf Theory 22:644–654

    Article  Google Scholar 

  • Drucker J (1995) The alphabetic labyrinth: the letters in history and imagination. Thames and Hudson, New York

    Google Scholar 

  • DuPont Q (2018a) The cryptological origins of machine translation, from al-Kindi to Weaver. Amodern 8, pp 1–20. http://amodern.net/article/cryptological-origins-machine-translation/

  • DuPont Q (2018b) The printing press and cryptography: Alberti and the Dawn of a notational epoch. In: Ellison K, Kim S (eds) A material history of medieval and early modern ciphers: cryptography and the history of literacy. Routledge, New York, pp 95–117

    Google Scholar 

  • DuPont Q (2017b) Blockchain identities: notational Technologies for Control and Management of abstracted entities. Metaphilosophy. https://doi.org/10.1111/meta.12267

  • DuPont Q (2017c) An archeology of cryptography: rewriting plaintext, encryption, and ciphertext. PhD dissertation, University of Toronto

    Google Scholar 

  • DuPont Q (2012) Cracking the Agrippa Code. http://www.crackingagrippa.net/. Accessed 19 Oct 2012

  • DuPont Q (2013) Cracking the Agrippa code: cryptography for the digital humanities. Scholarly and Research Communication 4:1–8. https://doi.org/10.22230/src.2013v4n3a126

    Article  Google Scholar 

  • Eco U (1986) Semiotics and the philosophy of language. Indiana University Press, Bloomington

    Google Scholar 

  • Eco U (1995) The search for the perfect language. Blackwell, Cambridge, MA

    Google Scholar 

  • Ellis JH (1999) The history of non-secret encryption. Cryptologia 23:267–273. https://doi.org/10.1080/0161-119991887919

    Article  Google Scholar 

  • Ellis JH (1970) The possibility of secure non-secret digital encryption. https://www.gchq.gov.uk/possibility-secure-non-secret-encryption

  • Ellison K (2008) Cryptogrammatophoria: the romance and novelty of losing readers in code. Eighteenth Century Fiction 20:281–305

    Article  Google Scholar 

  • Ellison K (2011) Millions of millions of distinct orders: multimodality in seventeenth-century cryptography manuals. Book History 14:1–24

    Article  Google Scholar 

  • Ellison K (2013) Digital scholarship as handwork and brainwork: an early modern history of cryptography. Journal for Early Modern Cultural Studies 13:29–46

    Article  Google Scholar 

  • Ellison K (2014) ‘1144000727777607680000 wayes’: Early Modern Cryptography as Fashionable Reading. Journal of the Northern Renaissance 6. http://www.northernrenaissance.org/1144000727777607680000-wayes-early-moderncryptography-as-fashionable-reading/

  • Ellison K (2017) A cultural history of early modern English cryptography manuals. Routledge, New York

    Google Scholar 

  • Ellison K, Kim S (eds) (2018) A material history of medieval and early modern ciphers: cryptography and the history of literacy. Routledge, New York

    Google Scholar 

  • Fuller M (ed) (2008) Software studies: a lexicon. MIT Press, Cambridge, MA

    Google Scholar 

  • Gebhart G (2017) We’re Halfway to Encrypting the Entire Web. In: Electronic Frontier Foundation. https://www.eff.org/deeplinks/2017/02/were-halfway-encrypting-entire-web. Accessed 20 Jun 2017

  • Golumbia D (2016) The politics of bitcoin: software as right-wing extremism. University Of Minnesota Press, Minneapolis

    Google Scholar 

  • Hartley RVL (1928) Transmission of information. Bell Syst Tech J 3:535–563

    Article  Google Scholar 

  • Hayles NK (1999) How we became Posthuman: virtual bodies in cybernetics, literature, and informatics. University of Chicago Press, Chicago

    Book  Google Scholar 

  • Hu T-H (2015) A prehistory of the cloud. The MIT Press, Cambridge, MA

    Book  Google Scholar 

  • Jones ML (2016) Calculating devices and computers. In: Lightman BV (ed) A companion to the history of science. Wiley, Malden, pp 472–481

    Google Scholar 

  • Kahn D (1967) The codebreakers: the story of secret writing. Macmillan, New York

    Google Scholar 

  • Kirby V (2003) Enumerating language: “the unreasonable effectiveness of mathematics”. Configurations 11:417–439. https://doi.org/10.1353/con.2004.0028

    Article  Google Scholar 

  • Kirschenbaum M (2008) Mechanisms: new media and the forensic imagination. MIT Press, Cambridge, MA

    Google Scholar 

  • Kittler F (1999) Gramophone, film, typewriter, 1st edn. Stanford University Press, Stanford

    Google Scholar 

  • Kittler F (1990) Discourse networks 1800/1900. Stanford University Press, Stanford

    Google Scholar 

  • Korolov M (2016) Study: Encryption use increase largest in 11 years. In: CSO Online. http://www.csoonline.com/article/3088916/data-protection/study-encryption-use-increase-largest-in-11-years.html. Accessed 20 Jun 2017

  • Krämer S (2015) Medium, messenger, transmission: an approach to media philosophy. Amsterdam University Press, Amsterdam

    Book  Google Scholar 

  • Lennon B (2010) In Babel’s shadow : multilingual literatures, monolingual states. University of Minnesota Press, Minneapolis

    Google Scholar 

  • Lennon B (2015) Passwords: Philology, Security, Authentication Diacritics 43:82–104

    Google Scholar 

  • Liu A (2004) The Laws of cool: knowledge work and the culture of information. University of Chicago Press, Chicago

    Book  Google Scholar 

  • Long PO (2004) Openness, secrecy, authorship: technical arts and the culture of knowledge from antiquity to the renaissance, paperbacks ed. Johns Hopkins University Press, Baltimore

    Google Scholar 

  • Maat J (2004) Philosophical languages in the seventeenth century: Dalgarno, Wilkins, Leibniz. Springer, Dordrecht

    Book  Google Scholar 

  • Mackenzie A (2006) Cutting code: software and sociality. Peter Lang, New York

    Google Scholar 

  • Mateas M (2008) Weird Languages. In: Fuller M (ed) Software studies: a lexicon. MIT Press, Cambridge MA

    Google Scholar 

  • Mateas M, Montfort N (2005) A box, darkly: Obfuscation, weird languages, and code aesthetics. In: Proceedings of the 6th Digital Arts and Culture Conference, IT University of Copenhagen. pp 144–153

    Google Scholar 

  • Montfort N (2008) Obfuscated code. In: Fuller M (ed) Software studies: a lexicon. MIT Press, Cambridge MA

    Google Scholar 

  • NSS Labs (2016) NSS Labs Predicts 75% of Web Traffic Will Be Encrypted by 2019. https://www.nsslabs.com/company/news/press-releases/nss-labs-predicts-75-of-web-traffic-will-be-encrypted-by-2019/. Accessed 20 Jun 2017

  • Nyquist H (1924) Certain factors affecting telegraph speed. Bell Syst Tech J 3:324–346

    Article  Google Scholar 

  • Oxford English Dictionary (2014) algorithm, n. OED Online

    Google Scholar 

  • Pasquale F (2015) The black box society: the secret algorithms that control money and information. Harvard University Press, Cambridge, MA

    Book  Google Scholar 

  • Pesic P (2000) Labyrinth: a search for the hidden meaning of science. MIT Press, Cambridge, MA

    Google Scholar 

  • Potter L (1989) Secret rites and secret writing: royalist literature. Cambridge University Press, New York, pp 1641–1660

    Google Scholar 

  • Raley R (2003) Machine translation and global English. The Yale Journal of Criticism 16:291–313. https://doi.org/10.1353/yale.2003.0022

    Article  Google Scholar 

  • Reeds JA, Diffie W, Field JV (eds) (2015) Breaking Teleprinter ciphers at Bletchley Park: an edition of I.J. Good, D. Michie and G. Timms: general report on tunny with emphasis on statistical methods (1945). Wiley-IEEE Press, Hoboken

    Google Scholar 

  • Rosenheim S (1997) The cryptographic imagination: secret writings from Edgar Allen Poe to the internet. The Johns Hopkins University Press, Baltimore

    Google Scholar 

  • Sandvine (2016) 70% Of Global Internet Traffic Will Be Encrypted In 2016. https://www.sandvine.com/pr/2016/2/11/sandvine-70-of-global-internet-traffic-will-be-encrypted-in-2016.html. Accessed 20 Jun 2017

  • Shannon C (1945) A mathematical theory of cryptography. Bell labs. Murray Hill

    Google Scholar 

  • Shannon C (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:656–715

    Article  Google Scholar 

  • Sherman WH (2010) How to make anything signify anything. Cabinet

    Google Scholar 

  • Singh S (2000) The code book: the science of secrecy from ancient Egypt to quantum cryptography. Anchor Books, New York

    Google Scholar 

  • Steiner G (1998) After babel: aspects of language and translation, third edition. Oxford Paperbacks, New York

    Google Scholar 

  • Stolzenberg D (ed) (2001) The great art of knowing: the baroque Encyclopedia of Athanasius Kircher. Stanford University Libraries, Florence

    Google Scholar 

  • Thomsen SW (2009) Some evidence concerning the genesis of Shannon’s information theory. Stud Hist Phil Sci 40:81–91

    Article  Google Scholar 

  • Wigner EP (1960) The unreasonable effectiveness of mathematics in the natural sciences. Commun Pure Appl Math 13:1–14

    Article  Google Scholar 

  • Williamson MJ (1974) Non-secret encryption using a finite field. https://www.gchq.gov.uk/non-secret-encryption-using-finite-field

  • Zielinski S (2008) Deep time of the media: toward an archaeology of hearing and seeing by technical means. MIT Press, Cambridge, MA

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Quinn DuPont .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Science+Business Media B.V., part of Springer Nature

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

DuPont, Q. (2018). Cryptographic Media. In: Hunsinger, J., Klastrup, L., Allen, M. (eds) Second International Handbook of Internet Research. Springer, Dordrecht. https://doi.org/10.1007/978-94-024-1202-4_34-1

Download citation

  • DOI: https://doi.org/10.1007/978-94-024-1202-4_34-1

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-024-1202-4

  • Online ISBN: 978-94-024-1202-4

  • eBook Packages: Springer Reference Biomedicine and Life SciencesReference Module Biomedical and Life Sciences

Publish with us

Policies and ethics