Abstract
Cryptographic technologies have become an essential and even ubiquitous component of online infrastructure, yet they are rarely acknowledged outside of technical literatures. This chapter contributes questions about the impact of these technologies on daily life, and suggests five threads for future analysis: encryption, obfuscation and hiding, code, language, and epistemology. While each has a technical side, in this chapter they are presented at the intersections with society, politics, and culture. In many cases, revitalizing these intersections requires looking for historical examples, when for instance, prior to the twentieth century, the technologies and our understanding of them were more fluid and integrated with cultural and scientific pursuits. The common dimension running through this history and its revitalization is a conception of cryptography and its cognate technologies as “media”.
References
Berry DM (2011) The philosophy of software: code and mediation in the digital age. Palgrave Macmillan, New York
Brunton F (2014) Kleptography Radical Philosophy:2–6
Brunton F, Nissenbaum H (2015) Obfuscation: a User’s guide for privacy and protest. MIT Press
Chun WHK (2008) Control and freedom: power and paranoia in the age of Fiber optics. MIT Press, Cambridge, MA
Churchhouse RF (2002) Codes and ciphers: Julius Caesar, the enigma, and the internet. Cambridge University Press, Cambridge
Cocks CC (1973) A Note on “Non-Secret Encryption”. https://www.gchq.gov.uk/notenon-secret-encryption
Cole E (2003) Hiding in plain sight: steganography and the art of covert communication. Wiley, Indianapolis
Cox G, McLean A, Berardi F “Bifo” (2012) Speaking code: coding as aesthetic and political expression. MIT Press, Cambridge, MA
Cramer F (2005) Words made flesh: code, culture, imagination. Piet Zwart Institute, Rotterdam
Diffie W (1988) First ten years of public-key cryptography. Proc IEEE 76:560–577
Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Trans Inf Theory 22:644–654
Drucker J (1995) The alphabetic labyrinth: the letters in history and imagination. Thames and Hudson, New York
DuPont Q (2018a) The cryptological origins of machine translation, from al-Kindi to Weaver. Amodern 8, pp 1–20. http://amodern.net/article/cryptological-origins-machine-translation/
DuPont Q (2018b) The printing press and cryptography: Alberti and the Dawn of a notational epoch. In: Ellison K, Kim S (eds) A material history of medieval and early modern ciphers: cryptography and the history of literacy. Routledge, New York, pp 95–117
DuPont Q (2017b) Blockchain identities: notational Technologies for Control and Management of abstracted entities. Metaphilosophy. https://doi.org/10.1111/meta.12267
DuPont Q (2017c) An archeology of cryptography: rewriting plaintext, encryption, and ciphertext. PhD dissertation, University of Toronto
DuPont Q (2012) Cracking the Agrippa Code. http://www.crackingagrippa.net/. Accessed 19 Oct 2012
DuPont Q (2013) Cracking the Agrippa code: cryptography for the digital humanities. Scholarly and Research Communication 4:1–8. https://doi.org/10.22230/src.2013v4n3a126
Eco U (1986) Semiotics and the philosophy of language. Indiana University Press, Bloomington
Eco U (1995) The search for the perfect language. Blackwell, Cambridge, MA
Ellis JH (1999) The history of non-secret encryption. Cryptologia 23:267–273. https://doi.org/10.1080/0161-119991887919
Ellis JH (1970) The possibility of secure non-secret digital encryption. https://www.gchq.gov.uk/possibility-secure-non-secret-encryption
Ellison K (2008) Cryptogrammatophoria: the romance and novelty of losing readers in code. Eighteenth Century Fiction 20:281–305
Ellison K (2011) Millions of millions of distinct orders: multimodality in seventeenth-century cryptography manuals. Book History 14:1–24
Ellison K (2013) Digital scholarship as handwork and brainwork: an early modern history of cryptography. Journal for Early Modern Cultural Studies 13:29–46
Ellison K (2014) ‘1144000727777607680000 wayes’: Early Modern Cryptography as Fashionable Reading. Journal of the Northern Renaissance 6. http://www.northernrenaissance.org/1144000727777607680000-wayes-early-moderncryptography-as-fashionable-reading/
Ellison K (2017) A cultural history of early modern English cryptography manuals. Routledge, New York
Ellison K, Kim S (eds) (2018) A material history of medieval and early modern ciphers: cryptography and the history of literacy. Routledge, New York
Fuller M (ed) (2008) Software studies: a lexicon. MIT Press, Cambridge, MA
Gebhart G (2017) We’re Halfway to Encrypting the Entire Web. In: Electronic Frontier Foundation. https://www.eff.org/deeplinks/2017/02/were-halfway-encrypting-entire-web. Accessed 20 Jun 2017
Golumbia D (2016) The politics of bitcoin: software as right-wing extremism. University Of Minnesota Press, Minneapolis
Hartley RVL (1928) Transmission of information. Bell Syst Tech J 3:535–563
Hayles NK (1999) How we became Posthuman: virtual bodies in cybernetics, literature, and informatics. University of Chicago Press, Chicago
Hu T-H (2015) A prehistory of the cloud. The MIT Press, Cambridge, MA
Jones ML (2016) Calculating devices and computers. In: Lightman BV (ed) A companion to the history of science. Wiley, Malden, pp 472–481
Kahn D (1967) The codebreakers: the story of secret writing. Macmillan, New York
Kirby V (2003) Enumerating language: “the unreasonable effectiveness of mathematics”. Configurations 11:417–439. https://doi.org/10.1353/con.2004.0028
Kirschenbaum M (2008) Mechanisms: new media and the forensic imagination. MIT Press, Cambridge, MA
Kittler F (1999) Gramophone, film, typewriter, 1st edn. Stanford University Press, Stanford
Kittler F (1990) Discourse networks 1800/1900. Stanford University Press, Stanford
Korolov M (2016) Study: Encryption use increase largest in 11 years. In: CSO Online. http://www.csoonline.com/article/3088916/data-protection/study-encryption-use-increase-largest-in-11-years.html. Accessed 20 Jun 2017
Krämer S (2015) Medium, messenger, transmission: an approach to media philosophy. Amsterdam University Press, Amsterdam
Lennon B (2010) In Babel’s shadow : multilingual literatures, monolingual states. University of Minnesota Press, Minneapolis
Lennon B (2015) Passwords: Philology, Security, Authentication Diacritics 43:82–104
Liu A (2004) The Laws of cool: knowledge work and the culture of information. University of Chicago Press, Chicago
Long PO (2004) Openness, secrecy, authorship: technical arts and the culture of knowledge from antiquity to the renaissance, paperbacks ed. Johns Hopkins University Press, Baltimore
Maat J (2004) Philosophical languages in the seventeenth century: Dalgarno, Wilkins, Leibniz. Springer, Dordrecht
Mackenzie A (2006) Cutting code: software and sociality. Peter Lang, New York
Mateas M (2008) Weird Languages. In: Fuller M (ed) Software studies: a lexicon. MIT Press, Cambridge MA
Mateas M, Montfort N (2005) A box, darkly: Obfuscation, weird languages, and code aesthetics. In: Proceedings of the 6th Digital Arts and Culture Conference, IT University of Copenhagen. pp 144–153
Montfort N (2008) Obfuscated code. In: Fuller M (ed) Software studies: a lexicon. MIT Press, Cambridge MA
NSS Labs (2016) NSS Labs Predicts 75% of Web Traffic Will Be Encrypted by 2019. https://www.nsslabs.com/company/news/press-releases/nss-labs-predicts-75-of-web-traffic-will-be-encrypted-by-2019/. Accessed 20 Jun 2017
Nyquist H (1924) Certain factors affecting telegraph speed. Bell Syst Tech J 3:324–346
Oxford English Dictionary (2014) algorithm, n. OED Online
Pasquale F (2015) The black box society: the secret algorithms that control money and information. Harvard University Press, Cambridge, MA
Pesic P (2000) Labyrinth: a search for the hidden meaning of science. MIT Press, Cambridge, MA
Potter L (1989) Secret rites and secret writing: royalist literature. Cambridge University Press, New York, pp 1641–1660
Raley R (2003) Machine translation and global English. The Yale Journal of Criticism 16:291–313. https://doi.org/10.1353/yale.2003.0022
Reeds JA, Diffie W, Field JV (eds) (2015) Breaking Teleprinter ciphers at Bletchley Park: an edition of I.J. Good, D. Michie and G. Timms: general report on tunny with emphasis on statistical methods (1945). Wiley-IEEE Press, Hoboken
Rosenheim S (1997) The cryptographic imagination: secret writings from Edgar Allen Poe to the internet. The Johns Hopkins University Press, Baltimore
Sandvine (2016) 70% Of Global Internet Traffic Will Be Encrypted In 2016. https://www.sandvine.com/pr/2016/2/11/sandvine-70-of-global-internet-traffic-will-be-encrypted-in-2016.html. Accessed 20 Jun 2017
Shannon C (1945) A mathematical theory of cryptography. Bell labs. Murray Hill
Shannon C (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:656–715
Sherman WH (2010) How to make anything signify anything. Cabinet
Singh S (2000) The code book: the science of secrecy from ancient Egypt to quantum cryptography. Anchor Books, New York
Steiner G (1998) After babel: aspects of language and translation, third edition. Oxford Paperbacks, New York
Stolzenberg D (ed) (2001) The great art of knowing: the baroque Encyclopedia of Athanasius Kircher. Stanford University Libraries, Florence
Thomsen SW (2009) Some evidence concerning the genesis of Shannon’s information theory. Stud Hist Phil Sci 40:81–91
Wigner EP (1960) The unreasonable effectiveness of mathematics in the natural sciences. Commun Pure Appl Math 13:1–14
Williamson MJ (1974) Non-secret encryption using a finite field. https://www.gchq.gov.uk/non-secret-encryption-using-finite-field
Zielinski S (2008) Deep time of the media: toward an archaeology of hearing and seeing by technical means. MIT Press, Cambridge, MA
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Science+Business Media B.V., part of Springer Nature
About this entry
Cite this entry
DuPont, Q. (2018). Cryptographic Media. In: Hunsinger, J., Klastrup, L., Allen, M. (eds) Second International Handbook of Internet Research. Springer, Dordrecht. https://doi.org/10.1007/978-94-024-1202-4_34-1
Download citation
DOI: https://doi.org/10.1007/978-94-024-1202-4_34-1
Received:
Accepted:
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-024-1202-4
Online ISBN: 978-94-024-1202-4
eBook Packages: Springer Reference Biomedicine and Life SciencesReference Module Biomedical and Life Sciences