11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

146 digital cashcould be worked backward easily if the person had theappropriate key.The second idea was that <strong>of</strong> key exchange. In classicalcryptography, there is a single key used for both encryption<strong>and</strong> decryption. In such a case it is absolutely vital to keepthe key secret from any third party, so arrangements haveto be made in advance to transmit <strong>and</strong> protect the key.Diffie, however, was able to work out the theory for asystem that generates pairs <strong>of</strong> mathematically interrelatedkeys: a private key <strong>and</strong> a public key. Each participantpublishes his or her public key, but keeps the correspondingprivate key secret. If one wants to send an encryptedmessage to someone, one uses that person’s public key(obtained from the electronic equivalent <strong>of</strong> a phone directory).The resulting message can only be decrypted by theintended recipient, who uses the corresponding secret,private key.The public key system can also be used as a form <strong>of</strong>“digital signature” for verifying the authenticity <strong>of</strong> a message.Here a person creates a message encrypted with his orher private key. Since such a message can only be decryptedusing the corresponding public key, any other person canuse that key (together with a trusted third-party key service)to verify that the message really came from its purportedauthor.Diffie <strong>and</strong> Hellman’s 1976 paper in the IEEE Transactionson Information Theory began boldly with the statementthat “we st<strong>and</strong> today on the brink <strong>of</strong> a revolution in cryptography.”This paper soon came to the attention <strong>of</strong> threeresearchers who would create a practical implementationcalled RSA (for Rivest, Shamir, <strong>and</strong> Adelman).Through the 1980s Diffie, resisting urgent invitationsfrom the NSA, served as manager <strong>of</strong> secure systems researchfor the phone company Northern Telecom, designing systemsfor managing security keys for packet-switched datacommunications systems (such as the Internet).In 1991 Diffie was appointed Distinguished Engineerfor Sun Microsystems, a position that has left him free todeal with cryptography-related public policy issues. Thebest known <strong>of</strong> these issues has been the Clipper Chip, aproposal that all new computers be fitted with a hardwareencryption device that would include a “back door” thatwould allow the government to decrypt data. Along withmany civil libertarians <strong>and</strong> privacy activists, Diffie did notbelieve users should have to trust largely unaccountablegovernment agencies for the preservation <strong>of</strong> their privacy.Their opposition was strong enough to scuttle the ClipperChip proposal by the end <strong>of</strong> the 1990s. Another proposal,using public key cryptography but having a third-party“key escrow” agency hold the keys for possible criminalinvestigation, also fared poorly. In 1998 Diffie <strong>and</strong> SusanL<strong>and</strong>au wrote Privacy on the Line, a book about the politics<strong>of</strong> surveillance <strong>and</strong> encryption. The book was revised <strong>and</strong>exp<strong>and</strong>ed in 2007.Diffie has received a number <strong>of</strong> awards for both technicalexcellence <strong>and</strong> contributions to civil liberties. These includethe IEEE Information Theory Society Best Paper Award(1979), the IEEE Donald Fink Award (1981), the ElectronicFrontier Foundation Pioneer Award (1994), <strong>and</strong> even theNational <strong>Computer</strong> Systems Security Award (1996), given bythe NIST <strong>and</strong> NSA.Further ReadingDiffie, Whitfield. “Interview with Whitfield Diffie on the Development<strong>of</strong> Public Key Cryptography.” Conducted by FrancoFurger; edited by Arnd Weber, 1992. Available online. URL:http://www.itas.fzk.de/mahp/weber/diffie.htm. Accessed September12, 2007.Diffie, Whitfield, <strong>and</strong> Susan L<strong>and</strong>au. Privacy on the Line: the Politics<strong>of</strong> Wiretapping <strong>and</strong> Encryption. Updated <strong>and</strong> exp<strong>and</strong>ed ed.Cambridge, Mass.: MIT Press, 2007.Kahn, David. The Codebreakers: The Story <strong>of</strong> Secret Writing. Reviseded. New York: Scribner, 1996.Levy, Steven. Crypto: How the Code Rebels Beat the Government:Saving Privacy in the Digital Age. New York: Viking Penguin,2001.digital cashAlso called digital money or e-cash, digital cash representsthe attempt to create a method <strong>of</strong> payment for online transactionsthat is as easy to use as the familiar bills <strong>and</strong> coinsin daily commerce (see e-commerce). At present, creditcards are the principal means <strong>of</strong> making online payments.While using credit cards takes advantage <strong>of</strong> a well-establishedinfrastructure, it has some disadvantages. From asecurity st<strong>and</strong>point, each payment potentially exposes thepayer to the possibility that the credit card number <strong>and</strong>possibly other identifying information will be diverted <strong>and</strong>used for fraudulent transactions <strong>and</strong> identity theft. Whilethe use <strong>of</strong> secure (encrypted) online sites has reduced thisrisk, it cannot be eliminated entirely (see computer crime<strong>and</strong> security). Credit cards are also impracticable for verysmall payments from cents to a few dollars (such as foraccess to magazine articles) because the fees charged by thecredit card companies would be too high in relation to thevalue <strong>of</strong> the transaction.One way to reduce security concerns is to make transactionsthat are anonymous (like cash) but guaranteed.Products such as DigiCash <strong>and</strong> CyberCash allow users topurchase increments <strong>of</strong> a cash equivalent using their creditcards or bank transfers, creating a “digital wallet.” The usercan then go to any Web site that accepts the digital cash <strong>and</strong>make a payment, which is deducted from the wallet. Themerchant can verify the authenticity <strong>of</strong> the cash throughits issuer. Since no credit card information is exchangedbetween consumer <strong>and</strong> merchant, there is no possibility<strong>of</strong> compromising it. The lack <strong>of</strong> wide acceptance <strong>and</strong> st<strong>and</strong>ardshas thus far limited the usefulness <strong>of</strong> digital cash.The need to pay for small transactions can be h<strong>and</strong>ledthrough micropayments systems. For example, users<strong>of</strong> a variety <strong>of</strong> online publications can establish accountsthrough a company called Qpass. When the user wants toread an article from the New York Times, for example, thefee for the article (typically $2–3) is charged against theuser’s Qpass account. The user receives one monthly creditcard billing from Qpass, which settles accounts with thepublications. Qpass, eCharge, <strong>and</strong> similar companies havehad modest success. A similar (<strong>and</strong> quite successful) serviceis <strong>of</strong>fered by companies such as PayPal <strong>and</strong> Billpoint,

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!