Jump to ContentJump to Main Navigation
2030Technology That Will Change the World$
Users without a subscription are not able to see the full content.

Rutger van Santen, Djan Khoe, and Bram Vermeer

Print publication date: 2010

Print ISBN-13: 9780195377170

Published to Oxford Scholarship Online: November 2020

DOI: 10.1093/oso/9780195377170.001.0001

Show Summary Details
Page of

PRINTED FROM OXFORD SCHOLARSHIP ONLINE (oxford.universitypressscholarship.com). (c) Copyright Oxford University Press, 2021. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in OSO for personal use. date: 23 January 2022

Cryptography

Cryptography

Chapter:
3.4 (p.135) Cryptography
Source:
2030
Author(s):

Rutger van Santen

Djan Khoe

Bram Vermeer

Publisher:
Oxford University Press
DOI:10.1093/oso/9780195377170.003.0022

Electronic payments, Internet shopping, and mobile communication have fundamentally changed our society and not only because digital services have made our lives more convenient. Never before in our history has our behavior been tracked in such detail as it is today. The bank remembers precisely where and when we withdraw cash from the machine, the phone company keeps a list of all our calls, and the online bookstore knows exactly what we like to read. Stores use loyalty cards and discount points to record their customers’ purchasing behavior. These databases have proved extremely useful. Companies can present us with attractive offers at just the right moment. All those data are useful for the authorities, too. They tell them if someone is in regular contact with a suspect or where a person was located at a particular time. The information helps the police and intelligence services prevent bombings or trace pedophiles. Much of this information is protected so that not just anyone is able to poke around our personal digital records. But protecting our privacy is increasingly difficult because the number of databases and communication channels continues to grow rapidly. Messages have been protected since the beginning of written communication. For a couple of millennia now, military dispatches have been translated into an incomprehensible alphabet soup in case they should fall into enemy hands. Breaking codes was and is a challenge. The course of World War II would probably have been entirely different if military codes had been more robust. The process of encoding and decoding can, of course, be performed much faster and more effectively in the computer age than was ever possible with pen and paper. Cryptography—the science of encryption—has perfected its techniques over the past decades. Cryptographers are constantly searching for mathematical operations that will allow insiders to decode a message easily and make it so hard for outsiders that it’s no longer worth the effort of even trying. Several important security techniques use prime numbers—numbers that are only divisible by 1 and by themselves. Examples are 2, 3, 5, and 13 but also 7,901 and 16,769,023.

Keywords:   Internet, army, cryptography, factoring large numbers, globalization, identity, social media, urbanization, wireless communication

Oxford Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .