Book ID: CBB427866448

Passwords: philology, security, authentication (2018)

unapi

Lennon, Brian (Author)


Belknap Press of Harvard University Press


Publication Date: 2018
Physical Details: 207
Language: English

Today we regard cryptology, the technical science of ciphers and codes, and philology, the humanistic study of human languages, as separate domains of activity. But the contiguity of these two domains is a historical fact with an institutional history. From the earliest documented techniques for the statistical analysis of text to the computational philology of early twenty-first-century digital humanities, what Brian Lennon calls "crypto-philology" has flourished alongside, and sometimes directly served, imperial nationalism and war. Lennon argues that while computing's humanistic applications are as historically important as its mathematical and technical origins, they are no less marked by the priorities of institutions devoted to signals intelligence. The convergence of philology with cryptology, Lennon suggests, is embodied in the password, an artifact of the linguistic history of computing that each of us uses every day to secure access to personal data and other resources. The password is a site where philology and cryptology, and their contiguous histories, meet in everyday life, as the natural-language dictionary becomes an instrument of the hacker's exploit. (Worldcat)

...More
Reviewed By

Review Huskey, Samuel J. (October 2019) Review of "Passwords: philology, security, authentication". Technology and Culture (pp. 1126-1127). unapi

Citation URI
https://data.isiscb.org/isis/citation/CBB427866448/

Similar Citations

Book Duane C. Wilson; (2021)
Cybersecurity (/isis/citation/CBB201310866/)

Article Jerome H. Saltzer; (January-March 2021)
On the Origin of Kerberos (/isis/citation/CBB051933073/)

Article DuPont, Quinn; Fidler, Bradley; (2016)
Edge Cryptography and the Codevelopment of Computer Networks and Cybersecurity (/isis/citation/CBB760734420/)

Article Sarah Myers West; (June 2022)
Cryptography as information control (/isis/citation/CBB869396949/)

Book Andrew J. Stewart; (2021)
A Vulnerable System: The History of Information Security in the Computer Age (/isis/citation/CBB758382142/)

Book Andrew Hodges; Douglas Hofstadter; (2014)
Alan Turing: The Enigma: The Book That Inspired the Film "The Imitation Game" (/isis/citation/CBB485951446/)

Article Thomas Haigh; Mark Priestley; (July 2020)
Contextualizing Colossus: Codebreaking Technology and Institutional Capabilities (/isis/citation/CBB455159316/)

Book David D. Clark; Sandra Braman; (2018)
Designing an Internet (/isis/citation/CBB601148284/)

Article Siddique Latif; Adnan Qayyum; Muhammad Usama; Junaid Qadir; Andrej Zwitter; Muhammad Shahzad; (September 2019)
Caveat Emptor: The Risks of Using Big Data for Human Development (/isis/citation/CBB326485886/)

Article Yost, Jeffrey R.; (2016)
Computer Security, Part 2 -- Editor's Introduction (/isis/citation/CBB453922047/)

Article Nicholas Paul Sheppard; (March 2020)
Can Smart Contracts Learn from Digital Rights Management? (/isis/citation/CBB343046132/)

Article Foley, Jillian; (March 2019)
Regulating Contested Reality: The Failure of US Encryption Regulations (/isis/citation/CBB627277329/)

Article Vijay Sivaraman; Hassan Habibi Gharakheili; Clinton Fernandes; Narelle Clark; Tanya Karliychuk; (June 2018)
Smart IoT Devices in the Home: Security and Privacy Implications (/isis/citation/CBB353680957/)

Article Yoshiyasu Takefuji; (March 2018)
Connected Vehicle Security Vulnerabilities (/isis/citation/CBB280716653/)

Book Geoff White; (2020)
Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global (/isis/citation/CBB227937681/)

Article O. M. Bonastre; A. Veà; (2019)
Origins of the Domain Name System (/isis/citation/CBB653105189/)

Article Ons Al-Shamaileh; (June 2018)
I Have Issues with Facebook: But I Will Keep Using It (/isis/citation/CBB503279988/)

Article Jones, Anita K.; Wulff, William A; (Spring 2002)
Cybersecurity (/isis/citation/CBB367643580/)

Article Roesner, Franziska; (Winter 2015)
Computer Security and Privacy: Where Human Factors Meet Engineering (/isis/citation/CBB605988846/)

Authors & Contributors
Wulff, William A
Hassan Habibi Gharakheili
Jones, Anita K.
Andrej Zwitter
Roesner, Franziska
Adnan Qayyum
Concepts
Computers and computing
Computer security; cyber security
Cryptography
Privacy
Internet
Technology and society
Time Periods
21st century
20th century
20th century, late
20th century, early
Places
United States
Bletchley Park
Middle and Near East
Great Britain
Institutions
Ethereum
Facebook (firm)
United States. National Security Agency
Massachusetts Institute of Technology, MIT
Comments

Be the first to comment!

{{ comment.created_by.username }} on {{ comment.created_on | date:'medium' }}

Log in or register to comment