<<

. 40
( 41 .)



>>

Apple Computer, 243
Caesar, Julius, 3, 27
AT&T, 6, 27, 43, 93, 250
Carnegie Mellon University, 196
Bacon, Roger, 3 Caronni, Germano, 45, 64
Beanie Babies, 138 Center for Democracy and Technology,
Beberg, Adam L., 200, 271 213, 256
Bell Labs, see AT&T Chase, Ken, 210, 236, 243
Bellovin, Steven M., 229 Chaum, David, XIII
Bennett, Jason, 187 Cheng, Howard, 147
Betka, Corey, 138 Clauson, Matt, 160
Bexley Public Library, 37 Clipper Chip, 229
Bidzos, Jim, 43 CMU, see Carnegie Mellon University
Biham, Eli, 151 Coble, Howard, 49
binary, 12 Coderpunks, 177, 201
Bischo¬, Alex, 76, 154 Coleman, Scott, 245
bitslicing, 151“153, 162, 190“192 Columbus Dispatch, 81
Bizdos, Jim, 263 Communications of the ACM, 15
Blaze, Matt, 229 Congress, 16, 49“55, 163, 213“214, 255
Boyd, Nate, 171, 182 failure to pass legislation, 278


287
288 Index

Cook, Kees, 187 DES Violation Group, 65, 116, 118,
165“166
Cray Research, 236
mistaken for DESCHALL, 116,
Crowell, William P., 53
141“146
cryptography
DES-Challenge Team, 65, 71, 73, 79
asymmetric, 23, 32
design, 64“65
Clinton administration policy, 50,
Organisation Committee, 64
149, 230
DESCHALL
codes, 26
attacked, 207“208
commercial, 9
birth of, 66“67
comparison to tumbler lock, 12, 23
bootdisk, 161
computer, 7“8
client distribution, 142“146, 249“250
controversial uses of, 279“281
independent, 156, 184
export of, XVIII, 51, 68, 70“71, 148,
client support, 117, 161
214, 231, 268“269
competition, 117“118, 152“153, 166,
government, XIII, 9
172, 186
history, 3“10
counting total clients, 132“133
Japanese, 5
design, 97“112, 150
machine, 4
development, 92
Enigma, 7
dial-up modems and, 71, 132,
perfect, 30
159“161, 209
regulation of, XVII, 49“50, 149,
estimating project completion, 226
232“233
exponential growth, 119
security, 26
¬rewalls and, 71, 135“138
substitution cipher, 27“28
full-match, 93
symmetric, 23
half-match, 93, 177, 246
today, 278
in Australia, 94
unbreakable, 27, 179
keyserver, 97, 155“156, 192, 240
uses of, XIII, XIV, 3, 276
mailing list, 70, 155, 216
Cypherpunks, XIII, 33, 35, 43, 177
optimization, 91“95, 114, 134, 152,
190
Damm, Arvid Gerhard, 4 limits of, 241
Data Encryption Standard, XIV, 22 outage, 128“129, 137“138, 193“196,
development of, 11 250“252
justi¬cation of, 11 false alarms, 140
publication, 20 portability, 93
weakness, XIV, XIX, 13“21, 34“35, process scheduling, 221
53 progress, 73, 85“90, 114, 118, 129,
withdrawn as a standard, 277 169
Data Encryption Standard, weakness, promotion, 77“84, 127“128, 169, 215
166 foiled, 171
Davis, Ruth M., 21 pronunciation, 1
Deep Blue, 171 publicity, 154“155, 265
Deep Crack, 272 rapid growth, 252
Dellahunt, William, 213 speed of software, 69
Department of Commerce, 51, 71 what was proved by, 276
Department of State, 22, 51 DESGUI, 209“211
DES key-cracking machine, 16“19, 34 DESKR (software), 44, 46, 61, 117
Deep Crack, 171 Di¬e, Whit¬eld, XIII, XIX, 14“15, 229
Index 289

Digital Millennium Copyright Act, 280 Haberlach, Adam, 79, 86, 118, 148, 182,
183
Digital Unix, 95
Hamilton, Drew, 121
distributed.net, 201, 271, 275
Harris, Jensen, 113, 114, 124, 141
Dolske, Justin, XIX, 65, 75, 80, 95, 118,
123, 135, 142, 147, 149, 165, 171, Hebern, Edward H., 4
184, 189, 196, 241, 259 Hellman, Martin, XIX, 15
Doolittle, Jim, 154 Heroux, Mike, 138, 151
Driscoll, Mike, 166 Hertz, Heinrich Rudolf, 113
Dwork, Cynthia, 179 Hildinger, Colin L., 159, 170, 178, 245
Hinnrichs, Scott M., 249
Eison, David E., 215 Hollings, Earnest, 164
Electronic Frontier Foundation, XV,
171, 272 IBM Corporation, 8, 179
Elvis+Co., 214 Thomas J. Watson Laboratory, 15
Encrypted Communications Privacy IEEE Communications Society, 21
Act, 230 iNetZ Corporation, 1
Enigma, 4“5 intelligence
Export Administration Regulation, 68 signal, 6
Eyrich, James F., 196 signals, 5
International Tari¬s in Arms Regula-
Fahlbusch, Michael, 246 tions, 21, 71
Falkenthal, John, 225, 235, 243 Internet, 14, 59
Feistel, Horst, 8“9 culture, 33
Felten, Edward, 280 growth, 139“140, 239“240
Fitchner, Erik, 243 use of duct tape and bailing wire, 249
Floyd, Jered, 64 Internet Society, 213
Forte, Milton, II, 160 InterNIC, 250
Fox, Vincent, 178 IRIX, 44, 93, 95
Fredrik, Lindgren, 262 ITAR, see International Tari¬s in Arms
FreeBSD, 93, 107, 115 Regulations
Freeh, Louis, 233
Front Range Internet, Inc., 194 Jillson, Carleton, 72
Johnson, Michael Paul, 67, 142
Gadad, Vijay S., 125 Johnson, Seth, 175
Gebis, Michael J., 129
General Atomics, 250 Kahn, David, 16
Georgia Tech, 196 Kasparov, Garry, 171
Gibbons, Steve, 44 Kernighan, Brian, 93
Gilchrist, Je¬, 182 Kerrey, Bob, 164, 255
Gilmore, John, XIII“XV, XIX, 272 Kerry, John, 164
Glazebrook, Andrew, 94, 156 key
Gmoser, Jason, 160 distribution, 14“15
Goldberg, Ian, 45 escrow, 51
Goodlatte, Bob, 213 management, 32
Graph-O-Matic, 118, 150, 197, 207, 245 recovery, 51
Great Internet Mersenne Prime Search, size, 13“14, 23“35
200, 262, 275 KeyBank, 79
Gross, Joe, 182 Kindred, Darrell, 152, 157, 222, 241,
Grotjan, Genevieve, 5 244
290 Index

Koch, Alexander, 4 New York Times, 16
Newsome, Tim, 64
Kocher, Paul, 272
NeXT Computer, 189
K¨nig, Thomas, 208
o
North American Cryptography Archive,
Ko¬el, Will, 182
68, 116, 141
Kohn, Robert H., 232
NSA, see National Security Agency
Kwan, Matthew, 152
NSF, see National Science Foundation
Lai, TC, 132
O™Connor, Ethan, 165
Leahy, Patrick, 230, 255
O¬ce of Defense Trade Controls, 22
Lenstra, Arjen K., 42
Ohio State University, 65, 146
Lickfett, Jay G., 186
Okon, Dennis, 202
Lindgren, Fredrik, 172, 184, 224
One-Time Pad
Linux, 44, 93, 107
seeVernam Cipher, 276
Litt, Robert S., 52
Oregon State University, 86
lock
OS/2, 93
tumbler, 12, 23
Osman, Brian, 122
Lott, Trent, 164, 269
Lucifer, 9, 12“13 Parekh, Sameer, 263
patents, 13 Pazdziora, Jan, 246
Pearl Harbor, 6
Macavinta, Courtney, 80 Penn State University, 243
Macintosh, 131, 154, 203 Peterson, Benjamin, 183, 211
Macintouch Web site, 154 Petreley, Nicholas, 47
Magic, 5 PGP, Inc., 231
Manasse, Mark S., 42 podkl qaites , 33
Manhattan Project, 30 Pretty Good Privacy, 34, 70, 231
McCain, John, 164, 255, 278 Pro-CODE, 49, 163“164, 230
McDermott, Scott, 245 Pro-CODE Act, 255, 269
McIntyre, Scott, 121 processor, 113“114
Megasoft Online, 43, 146 Alpha, 134
Meggs, Andrew, 203 AMD, 94, 134
Minar, Nelson, 166, 170, 181, 199, 217, Cyrix, 94, 134
224, 265 Intel, 94, 134
Minyard, Perry, 186 bug, 175“176
Moller, Bill, 117 MIPS, 93, 134
Pentium compatible, 94
National Bureau of Standards, 11, 16 SPARC, 93
DES workshops, 16“20 UltraSPARC, 134, 191
National Center for Supercomputing wearing out, 124
Applications, 182 Project Gutenberg, 46
National Science Foundation, XIII, 250 protected memory, 219
National Security Agency, 9“13, 30, 53, Purple, 5
57
NBS, see National Bureau of Standards Raymond, Matt, 163
Nelson, Michael, 181 RC5 Bovine, 166, 200, 262
network Recording Industry Association of
collaboration, XV America, 280
Network Solutions, Inc., 250 Reinsch, William A., 50
Neumann, Peter G., 208, 229 Ritchie, Dennis, 93
Index 291

Rivest, Ron, XIII, 41, 43 supercomputer, 53, 57, 236
Roessler, Thomas, 64 unsuitability for brute-force attacks,
Roosevelt, Franklin D., 6 57“58
Rosenberg, Julius and Ethel, 30
Terrell, Dave, 186
Rowlett, Frank, 5
Toy Story, 200
RSA (algorithm), 41
Trei, Peter, XIX, 35, 43, 61
RSA Data Security, Inc., XVII, 41“43,
263
UIUC, see University of Illinois at
Factoring Challenges, 42“43
Urbana-Champaign
noticing DESCHALL, 84
Ultrix, 44
Runge, Karl, XIX, 119, 130, 196, 201,
University of California, Berkeley, 45
204, 242
University of Illinois at Urbana-
SAFE Act, 49, 163, 213, 255, 278 Champaign, 196
Sanders, Michael K., 1, 261 Unix, 93
Scherbius, Arthur, 4 Usenet, 78
Schleicher, Chris, 220 comp.os.linux.announce, 171
Schoen, Seth D., 254
Secure Digital Music Initiative, 280 Van Iwaarden, Ronald, 157
Secure Public Networks Act, 164, 255, VENONA, 30
269 Vernam Cipher, 27“32, 276
SETI@HOME, 200 drawbacks, 32
SGI, 235“238 Vernam, Gilbert, 27
Shamir, Adi, 41 Verser, Rocke, XIX, 65“67, 70, 80, 92,
Shannon, Claude E., 6“7, 12 97, 123, 127, 150, 155, 172, 185,
Signals Intelligence Service, 5, 30 191, 193, 207, 226, 237, 259
Silicon Graphics, Inc., see SGI Voters Telecommunications Watch, 256
Solaris, 44, 93, 95
SolNET watermarking, 280
client bug, 224 Weage, Josh, 141
SolNET Team, 65, 116, 152 Weems, Randy, 210
attacked, 172“173, 208“209, 246 Welty, Andrew James Alan, 160
comparison to DESCHALL, 147“149, whois failure, 250
165 Wiener, Michael, 34
Sonko, Lee, 115 Williams, Aaron, 136
Soviet Union, 30 Windows, 93
Spitznagel, Bridget, 75 WIRED, 33
Stadtler, Otis, 6 Woltman, George, 275
Stan¬ll, Michael D., 190 Worcester Polytechnic Institute, 85

<<

. 40
( 41 .)



>>