Steven Levy always does a good job of making a complex and potentially dry subject readable for a wide audience, using an approach similar to the approach he took in Hackers he uses the personal history of the participants as a lens to study the history of a technology development.
Crypto outlines the history of cryptography as it lurched towards public availability Levy provides an overview of both technical and political obstacles that occurred along the way Examines issues of control, personal [ So, think of this as another installment of the Artnoose Moves Into the 21st Century series, even though most of the history in this book takes place in the 70s through 90s Simply put, this is a history of the invention of encrypted electronic communication It starts with a very brief history of cryptology Caesar ciphers, the Enigma Machine, etc and follows the life stories of the people who ended up in the s inventing the public key private key method of encryption and the subsequent techno [ If I m not mistaken, I bought this book at the Computer History museum, in Mountain View, just across the street from Googleplex, about six years ago When I picked it up this holidays, I might have been feeling a bit tired from all the fantasy I ve made my way through recently, but whatever the reason, I was in for a treat.
This book shows its age by the retrospect that occurs The history is great and free flowing with great details, but there was so much going on than what this book allows and the very last pages hint at this when it mentions Ellis You never know his real contributions, but the government of the US and Great Britain side of this equation were watching the commercial cryptographers with a bit of wonder at how they were coming up with their codes and how their processes were comparing with theirs O [ This book was a page turner Extremely well written description of battle between individual privacy and the NSA that went on from to The era started with Martin Gardner s article in Scientific American on RSA , a public key cryptography system and how large primes, modular arithmetic, and one way functions can be used to create mostly unbreakable codes Levy mixes mathematics, history and politics to show that Big Brother doesn t always know best From Fermat s Little theorem and [ A fifteen year old book on technology doesn t seem like it could be relevant enough to warrant attention, but it was worth reading for two reasons First, it s a history book, so the events and concepts haven t changed But importantly the world is essentially in the same state it was in when the book was published in cryptography is still legal, the export battle is still won We still use hybrid encryption with RSA and certificate authorities, as we did then The book feels current, and ther [ Steven Levy is something of a legend amongst the annals of computing history His writing is fresh and concise this is a volume anyone could read, whether programmer, executive, or conspiracy theorist Highly technical concepts are brought down to lay terms, and yet there is enough detail to keep the gear head interested.
This is a volume I will have on my shelf simply because I m proud to have read it It will go somewhere around the proximity of Donald Ervin Knuth. This is one hell of a non fiction book I tore through it in every free moment I had in four days, and I m probably going to re read it, too It paints an exciting history of the discovery of private sector encryption algorithms, and colorful skirmishes between professors, tech entrepreneurs and the NSA.
Great readVery well conveyed story of how the last best hope for liberty was given to mankind. Also serves as a testimony of how little trust we should have in government and it s beauracratic functionaries. Very good history on cryptography, it talk about the thing that many forgotten, from the creation of Public Key Crypto to export restriction in US. Excellent background and details on the recent history of cryptography.
Might get a little boring in the middle, but worth reading through all the way. Steven Levy has an amazing talent for taking complicated, technical material and turning into engaging narrative. I m not particularly interested in cryptography, but knowing that Levy was interested enough to write a book about it prompted me to pick up Crypto and give it a try.
Not only does he manage to take a complex issue and break it down into mostly easy to follow language, but the he weaves a story that s not really about codes, cyphers, or security, It s about people as all of the best st [ Great book and wonderfully easy to read without being so dumbed down that it is an insult to moderately educated people It read at times like a magazine article a little too much forced drama to put the reader on edge, but quite informative Nice to read about some of the underpinnings of our digital society.
Current encryption is theoretically impossible to breakof course in practice people choose passwords and keys that are easily remembered and thus, easily guessed or they write the password on [ This book is a super interesting history of modern cryptography, starting in the 50 s and 60 s, where crypto was almost entirely controlled by the government, and leading up to the world today, where cryptography is in use on just about every computer in the world It was recommended to me by a professor who saw part of this story take place at Berkeley Most interesting thing about this book is the insight it gives in to the NSA My big lesson is that the behavior we re seeing in the NSA today lar [ I found this book in a Little Free Library and loved it This was a quick easy read that made the memorable personalities behind crypto accessible It also explains the technology well.
Frequently bought together. Total price:. To see our price, add these items to your cart. Choose items to buy together. Customers who viewed this item also viewed. Page 1 of 1 Start over Page 1 of 1. Hackers: Heroes of the Computer Revolution. Steven Levy. Nathaniel Popper. Antony Lewis. Camila Russo. Saifedean Ammous. What other items do customers buy after viewing this item? Facebook: The Inside Story. Simon Singh.
David Kahn. Review "Gripping and illuminating. He lives in New York City with his wife and son. Start reading Crypto on your Kindle in under a minute. Audible Holiday Deal. Get this deal. About the author Follow authors to get new release updates, plus improved recommendations. Brief content visible, double tap to read full content. Full content visible, double tap to read brief content.
Read more Read less. Customer reviews. How are ratings calculated? Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzes reviews to verify trustworthiness. Top reviews Most recent Top reviews. Top reviews from the United States.
There was a problem filtering reviews right now. Please try again later. Verified Purchase. I bought this book based on the recommendation of the professor who teaches my cyber security class, and since it is out of print, I took a chance and got a used one.
The condition of the book is far better than I anticipated and the seller shipped it super fast. As for the content, it is interesting and engaging and Mr. Levy has done a great job at conveying the history and importance of cryptography and how it relates to cyber security on a level that is neither overly technical nor dumbed down. While the book was originally published nearly two decades ago, the information is still relevant today. Knowledge is power, and it is our best defense against those who seek to hurt us.
This book will help you find your ammunition. This story about the development of computer cryptography is both fascinating and important. The book is very well-written, and very easy to read. Its importance lies in the fact that it explains the machinations of government agencies to prevent the masses from using strong cryptography, and how the good guys in the software industry were able to overcome the obstacles. So, if you need a good read, go ahead and grab a copy.
This easy-to-ready short history by writer Steven Levy, who has written numerous articles for Wired, is a very well-researched volume on the human side of public-key cryptography. Clearly, this is an authoritative account of the short year history of public key. The main theme of the book is how the NSA tried to stifle new developments by the researchers, placing secrecy orders and classifying their patents and papers. Five stars, for what it is; sure, Levy writes with magazine-style prose, but this fits the high-level view he takes on the subject.
The lengths that the NSA went to in order to quash attempts at building solid encryption are astounding. This book reads like a spy novel The book was in perfect condition and arrived quickly.
From Stephen Levy the author who made hackers a household word comes this account of Levy Steven. Файл формата pdf; размером 3,90 МБ. Hackers: Heroes of the Computer Revolution - 25th Anniversary Edition · O'Reilly Media · Steven Levy. Год: Язык: english. Файл: PDF, 13,07 MB. Steven Levy gives a fascinating account of the birth of public key cryptography in Crypto, John Naughton, The Guardian, February 3,