SHARE
Facebook X Pinterest WhatsApp

Unix Insider: The opening of secrets – Steven Levy recounts the history of public key cryptography

Written By
thumbnail
Web Webster
Web Webster
Mar 11, 2001

“Crypto shows us cryptography’s 30-year journey from the secret
world of the National Security Agency (NSA) to the world at large.
The journey begins in the early 1970s with Whitfield Diffie, a
misfit MIT student who felt the need to keep his private
information secret and went on a quixotic search for technology
that would let him do so. His search took him across the country to
Stanford, where he met math professor Martin Hellman.”

“Levy is careful to emphasize just how revolutionary public key
encryption was. The very idea that ordinary citizens could protect
their information and send it over a network gave the intelligence
and law enforcement communities the heebie-jeebies. The CIA
intercepted communications to sniff out terrorists and steal
secrets from the Soviets, and the FBI did so to track down drug
dealers and child pornographers. Giving everyday people the ability
to keep their communications secret would be like taking away the
agencies’ ability to bug and wiretap. Scandalous.”

“If the NSA had its way, private citizens would not be allowed
to use cryptography. But in the 1960s, researchers from IBM
developed an algorithm to give the technology to the company’s many
corporate customers. The NSA tried to stifle IBM’s invention. After
much negotiation, IBM agreed to relinquish control of the
technology to the NSA in exchange for financial consideration and
the agency’s imprimatur. The result was the Data Encryption
Standard (DES), which IBM and others began to build into their
products.”


Complete Story

thumbnail
Web Webster

Web Webster

Web Webster has more than 20 years of writing and editorial experience in the tech sector. He’s written and edited news, demand generation, user-focused, and thought leadership content for business software solutions, consumer tech, and Linux Today, he edits and writes for a portfolio of tech industry news and analysis websites including webopedia.com, and DatabaseJournal.com.

Recommended for you...

Red Hat reveals major enhancements to Red Hat Enterprise Linux AI
sjvn
Oct 22, 2024
How to Find AWS EC2 Instance Type Over SSH (6 Methods)
Benny Lanco
Sep 23, 2024
Crond: Daemon to Execute Scheduled Commands
Rose Hosting Blog
Sep 20, 2024
A Detailed Introduction to Oracle VirtualBox
Senthil Kumar
Sep 19, 2024
Linux Today Logo

LinuxToday is a trusted, contributor-driven news resource supporting all types of Linux users. Our thriving international community engages with us through social media and frequent content contributions aimed at solving problems ranging from personal computing to enterprise-level IT operations. LinuxToday serves as a home for a community that struggles to find comparable information elsewhere on the web.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.