Facebook Twitter Pinterest
  • Alle Preisangaben inkl. MwSt.
Nur noch 1 auf Lager (mehr ist unterwegs).
Verkauf und Versand durch Amazon. Geschenkverpackung verfügbar.
Crypto: Secrecy and Priva... ist in Ihrem Einkaufwagen hinzugefügt worden
+ EUR 3,00 Versandkosten
Gebraucht: Gut | Details
Verkauft von Lesekumpel
Zustand: Gebraucht: Gut
Kommentar: 072
Möchten Sie verkaufen?
Zur Rückseite klappen Zur Vorderseite klappen
Hörprobe Wird gespielt... Angehalten   Sie hören eine Hörprobe des Audible Hörbuch-Downloads.
Mehr erfahren
Alle 3 Bilder anzeigen

Crypto: Secrecy and Privacy in the New Cold War (Penguin Press Science) (Englisch) Taschenbuch – 31. Dezember 2001

3.5 von 5 Sternen 2 Kundenrezensionen

Alle Formate und Ausgaben anzeigen Andere Formate und Ausgaben ausblenden
Neu ab Gebraucht ab
Kindle Edition
"Bitte wiederholen"
"Bitte wiederholen"
EUR 22,47
EUR 16,01 EUR 0,14
11 neu ab EUR 16,01 19 gebraucht ab EUR 0,14
click to open popover

Wird oft zusammen gekauft

  • Crypto: Secrecy and Privacy in the New Cold War (Penguin Press Science)
  • +
  • Hackers: Heroes of the Computer Revolution - 25th Anniversary Edition
Gesamtpreis: EUR 38,42
Die ausgewählten Artikel zusammen kaufen

Es wird kein Kindle Gerät benötigt. Laden Sie eine der kostenlosen Kindle Apps herunter und beginnen Sie, Kindle-Bücher auf Ihrem Smartphone, Tablet und Computer zu lesen.

  • Apple
  • Android
  • Windows Phone

Geben Sie Ihre Mobiltelefonnummer ein, um die kostenfreie App zu beziehen.

Jeder kann Kindle Bücher lesen — selbst ohne ein Kindle-Gerät — mit der KOSTENFREIEN Kindle App für Smartphones, Tablets und Computer.




Author Steven Levy, deservedly famous for his enlightening Hackers, tells the story of the cypherpunks, their foes, and their allies in Crypto; if the National Security Agency (NSA) had wanted to make sure that strong encryption would reach the masses, it couldn't have done much better than to tell the cranky geniuses of the world not to do it.

From the determined research of Whitfield Diffie and Marty Hellman, in the face of the NSA's decades-old security lock, to the commercial world's turn-of-the-century embrace of encrypted e-commerce, Levy finds drama and intellectual challenge everywhere he looks. Although he writes, "Behind every great cryptographer, it seems, there is a driving pathology", his respect for the mathematicians and programmers who spearheaded public key encryption as the solution to Information Age privacy invasion shines throughout. Even the governmental bad guys are presented more as hapless control fetishists who lack the prescience to see the inevitability of strong encryption as more than a conspiracy of evil.

Each cryptological advance that was made outside the confines of the NSA's Fort Meade complex was met with increasing legislative and judicial resistance. Levy's storytelling acumen tugs the reader along through mathematical and legal hassles that would stop most narratives in their tracks--his words make even the depressingly silly Clipper chip fiasco vibrant. Hardcore privacy nerds will value Crypto as a review of 30 years of wrangling; those readers with less familiarity with the subject will find it a terrific and well-documented launching pad for further research. From notables like Phil Zimmerman to obscure but important figures like James Ellis, Crypto dishes the dirt on folks who know how to keep a secret. --Rob Lightner


"Gripping and illuminating." —The Wall Street Journal

"A great David-and-Goliath story—humble hackers hoodwink sinister spooks." —Time

Alle Produktbeschreibungen


3.5 von 5 Sternen
5 Sterne
4 Sterne
3 Sterne
2 Sterne
1 Stern
Beide Kundenrezensionen anzeigen
Sagen Sie Ihre Meinung zu diesem Artikel


Von Ein Kunde am 14. März 2002
Format: Gebundene Ausgabe Verifizierter Kauf
Can any fiction be more thrilling than real life? After reading 'Crypto', I'd say clearly 'NO'. Ordinary people get under pressure by NSA for persuing what they consider being their rights. X-Files could not be more into conspiracy-theory than this book is by re-telling reality.
A great book that makes me appreciate the security I use in everyday-life so thoughtlessly, that I just take for granted, a whole lot more.
This book vividly draws the characters involved for so many different reasons in the development of public crypto without making them saints or heroes.
As a side effect we experience the speed-of-light-pace of computer development, some of the assumptions made in the 1960s/1070s today only make us smile.
Not only is this story well written and investigated, it gives us an idea of what is to come now in the fight for privacy now that the 9-11 catastrophy has upped the the speed in Big Brother activism spawned by administrations all around the globe.
Kommentar 13 Personen fanden diese Informationen hilfreich. War diese Rezension für Sie hilfreich? Ja Nein Feedback senden...
Vielen Dank für Ihr Feedback.
Wir konnten Ihre Stimmabgabe leider nicht speichern. Bitte erneut versuchen
Missbrauch melden
Format: Taschenbuch
Als Security-Expertin mit Spezialgebiet Kryptographie steht dieses Buch natürlich ganz oben auf meiner Liste. Levy hat wunderbar recherchiert und haucht Leben ein in Männer wie Whitfield und Hellman, die man sonst nur trocken mit key exchange in Verbindung bringt. Trotzdem lässt das Buch vom Schreibstil her sehr viel zu wünschen über. Ich habe mich relativ lange gequält, dieses Buch fertig zu lesen (obwohl mich das Thema total interessiert!), weil es für mich einfach nicht flüssig genug geschrieben ist. Es hat mich einfach nicht in seinen Bann ziehen können, die Spannung, unbedingt weiterlesen zu müssen (weil es so interessant ist), war einfach nicht da. Zusammenfassend kann ich also sagen, dass Levy sich extrem bemüht hat, die menschliche Seite der Geschichte Kryptographie zu beleuchten, aber sein Schreibstil nicht für einen guten Schriftsteller reicht.
Kommentar 3 Personen fanden diese Informationen hilfreich. War diese Rezension für Sie hilfreich? Ja Nein Feedback senden...
Vielen Dank für Ihr Feedback.
Wir konnten Ihre Stimmabgabe leider nicht speichern. Bitte erneut versuchen
Missbrauch melden

Die hilfreichsten Kundenrezensionen auf Amazon.com (beta)

Amazon.com: HASH(0x93b9c360) von 5 Sternen 65 Rezensionen
74 von 78 Kunden fanden die folgende Rezension hilfreich
HASH(0x938e2198) von 5 Sternen Compelling story should be of interest to all 'net users 21. Januar 2001
Von J. G. Heiser - Veröffentlicht auf Amazon.com
Format: Gebundene Ausgabe
Levy is one of my favorite essayists. He finds a compelling story, researches it exhaustively, and then shares his excitement. The history of Internet cryptography is a perfect subject for Levy, who delights in recounting stories about technoradicals with new ideas who see them through to fruition.
Encryption truly is one of the most critical technologies necessary for a smoothly functioning virtual world, and is very much the case that the U.S. Federal Government successfully delayed the general availability of strong encryption for at least a decade. (Future economists may point back to the last two decades of the 20th century and show how this failed government policy was responsible for the loss of U.S. dominance in the high-tech market.)
It would have been easy to take the politically correct road and portray the Feds as being evil conspirators, bent on maintaining their own power and pride at the expense of the entire world. Levy chooses a more balanced approach, depicting the NSA in nearly heroic terms. He is especially sympathetic towards Clint Brooks (a name I did not know), an NSA lifer who developed the key escrow concept as a compromise that would allow widespread public utilization of strong encryption while still allowing law enforcement (and of course, intelligence agencies), the ability to intercept communications under controlled circumstances. If both the NSA and their philosophical opponents are heroes with noble goals, a tragic ending is inevitable, which adds an element of pathos to this triumph of democracy.
As a former software vendor, I've been totally frustrated by both the crypto export laws and by the NSA attitude of "If you only knew what we knew, you wouldn't even ask that question." That argument turned out to be just as specious now as everyone thought it was at the time, but the marvelous aspect of this book is that Levy is able to make a cynic like me accept that the people within the Puzzle Palace have legitimate motivations. (He is much harsher on the FBI, and creates an especially unflattering portrayal of Louie Freeh). It's a well-balanced approach to a very contentious subject, which adds considerably to the author's credibility.
Personalities loom large in a history like this one, and Levy is a master at drawing them out of their personal shells and detailing aspects of their private lives to explain their motivations and feelings. Whitfield Diffie is the old master who had the vision to conceive of a new model for encryption that would meet the unprecedented needs of a network society. Ron Rivest was the energy behind the development of the most significant public key algorithm, created by an unlikely trio of inventors. Jim Bidzos was a young playboy who found the commercialization of the RSA technology to be the challenge he needed in his hitherto shallow life of world travel, hot cars and fast women. Like Diffie, Phil Zimmerman marches to a drummer that only he can hear, yet this amateur programmer succeeded in popularizing strong encryption long before RSA and its millions in venture cap money did. Given his ten years of personal research and interviews of the people he chronicles, Levy's will probably be the definitive written account on many of these quirky visionaries.
The book is a quick read, but a good one. Technically, it is very accurate, with one unfortunate mistake on page 178 where it reads "Then he uses the hash function to recreate Alice's message from the digest..." Hash functions are 1-way functions, and cannot be reversed. If it read instead, "Then he uses the hash function to recreate Alice's message digest..." it would be more accurate. In order to verify a digital signature, the encrypted hash value provided by the sender is decrypted by their public key, which is then compared to another hash value generated by the verifying party (see p. 38 of "Applied Cryptography, 2nd Edition" by Bruce Schneier). Other than this confusion over how digital signatures are verified, the book does an excellent job of presenting the concepts of public key encryption to a non-technical reader. Besides being an enjoyable tale of business and technology history, this book could also be considered an executive-level introduction to the need for encryption on the Internet and the ways in which modern implementations provide it.
If you want to know what is happening when that little lock icon at the bottom of your web browser closes, you'll find a conceptual answer in this book. You'll not only learn the sequence of events that led to the development of SSL, but you'll also read the history of the first successful attempt to crack SSL security, and its significance to you as a customer of sites like Amazon. "Crypto" should appeal not only to those who are interested in the history of technology, but anyone wanting to understand more about the history and personal and commercial use of encryption on the Internet. Anyone involved in an e-commerce project or with an interest in information security would find this an interesting and accessible book. It is not a technology book per se, but I think most technically-oriented people will enjoy reading about how people like them had the drive and vision to change the world-especially when the odds were so heavily stacked against them.
This is a compelling and important story that needs to be told and understood. Levy is neither the first to undertake this telling, and undoubtedly won't be the last, but I'm convinced that this will become a classic of technology history-even more so than his earlier books. His thoroughness, extensive research, and evenhanded approach will make this book an important source for future researchers.
18 von 20 Kunden fanden die folgende Rezension hilfreich
HASH(0x938e8750) von 5 Sternen Dry but informational 7. Februar 2001
Von Stephen Cole - Veröffentlicht auf Amazon.com
Format: Gebundene Ausgabe
Steve Levy presents an accurate picture of the events surrounding todays crypto debate in his book "Crypto." Unfortunately, he does it with the same narrative style he uses for his magazine articles. The result is that the events are correct, but the story unfolds more like a textbook, not a novel.
Overall, it is an interesting (if dry) read, and, at times will add words (a la Neal Stephenson in Cryptonomicon) to your vocabulary. If you are interested in the history of todays debates on cryptography, I recommend it. If you want to know more about cyphers and other code making/breaking, I would recommend something like Simon Singh's "The Code Book."
15 von 17 Kunden fanden die folgende Rezension hilfreich
HASH(0x938e2cfc) von 5 Sternen Very good, but incomplete 13. Mai 2001
Von Victor A. Vyssotsky - Veröffentlicht auf Amazon.com
Format: Gebundene Ausgabe
This book is an entertaining account of many of the people and episodes involved in making cryptography and cryptanalysis a respectable and important topic of work for scientists and engineers not affiliated with any government agency. The incidents recounted that I happen to know about personally are well and accurately described here. But there are a couple of gaps.
First, some of the key players "on the outside" are not mentioned; this may well be because most of those who aren't mentioned by now are "insiders." But this results in some of this book being a bit misleading. For example, serious work on cryptanalysis by outsiders, including one piece of work that Admiral Inman, when head of NSA, described as "the most brilliant piece of civilian cryptanalysis since World War II", was already going on by the late 1970s; this had serious national security implications, and helps to explain why NSA was so ambivalent about "outsiders" engaging in *any* crypto research. Overall, although NSA goofed badly several times, I think they managed to keep a more balanced view on the issue than I might have expected. The fact that Levy doesn't mention some of the key "outsider" work suggests to me that he may not have talked with (or at least didn't gain the confidence of) such people as Cipher Deavours and David Kahn, who could have given him perspective on the "outsider" work that he doesn't discuss.
Secondly, I infer that he was unable to get any of the NSA side of the story from NSA itself. This is a pity. It's presumably not Levy's fault; NSA only talks to people it decides to talk to, and then says only what it decides needs to be said. I assume that Levy tried to get information from NSA and failed; I don't know. But if NSA stonewalled Levy, it's because he didn't make the right contacts to get in touch with somebody who would have been willing to talk with him about NSA's viewpoint on various issues Levy discusses that are not sensitive in NSA's view. That extra information would have helped make Levy's book clearer and more complete. In spite of this, Levy is quite fair to NSA, which speaks well of his thoughtfulness and balance.
So, overall I regard this as a good book, well worth reading, provided one keeps in mind that it's not the complete story.
8 von 8 Kunden fanden die folgende Rezension hilfreich
HASH(0x938e9924) von 5 Sternen Excellent short history on the human side of pub. key crypto 30. April 2001
Von Marcelo P. Lima - Veröffentlicht auf Amazon.com
Format: Gebundene Ausgabe Verifizierter Kauf
This easy-to-ready short history by writer Steven Levy, who has written numerous articles for Wired, is a very well-researched volume on the human side of public-key cryptography.
Levy has interviewed all of the major players: Diffie, Adleman, Chaum, Zimmerman, and others; he's done nearly a decade of research on the subject, and monitored the sci.crypt.* newsgroups. Clearly, this is an authoritative account of the short 30-year history of public key.
The main theme of the book is how the NSA tried to stifle new developments by the researchers, placing secrecy orders and classifying their patents and papers. Throughout the book, as Levy draws out the characters, it's the crypto community vs. the government, until ultimately the cypherpunks win out.
This book doesn't contain a single diagram; no photos, and no equations at all. So if you're looking for a technical introduction to crypto, look elsewhere; this is purely an informally-written account on the people behind the scenes.
Five stars, for what it is; sure, Levy writes with magazine-style prose, but this fits the high-level view he takes on the subject. Most importantly, this volume was exhaustively researched and has the collaboration of all of the key players, which lends Levy's account great credibility.
9 von 10 Kunden fanden die folgende Rezension hilfreich
HASH(0x938e9abc) von 5 Sternen Goes "Behind the Firewall" for an Insider's Account 18. Januar 2001
Von Stephen Hardiman - Veröffentlicht auf Amazon.com
Format: Gebundene Ausgabe
Riveting true stories that are well researched. Levy weaves an intriguing account of cryptography's "eccentric patriots" and their dedication to the craft. It is primarily a story of people and the government politics that tried to ensnare them, not a treatise on ciphers and hashing algorithms. Explanations of cryptography are lucid, even if math wasn't your best subject.
It's an excellent addition to American historical literature that we've sorely lacked after 50 years of Cold War stifled journalists from reporting details about anything that might threaten national security.
Non-fiction literature buffs and researchers will appreciate the copious endnotes, glossary, and index. While it also includes an extensive bibliography, Levy conducted many interviews to write this original work.
Waren diese Rezensionen hilfreich? Wir wollen von Ihnen hören.