Article ID: CBB869396949

Cryptography as information control (June 2022)

unapi

Sarah Myers West (Author)


Social Studies of Science
Volume: 52
Issue: 3
Pages: 353-375
Publication date: June 2022
Language: English


In 1976, two researchers declared a revolution in cryptography: With the invention of public key encryption, cryptography could be used not only to share secret messages, but to secure and authenticate communications networks, and, eventually, to enable radically new kinds of social relationships facilitated by networked communication technology. This article explores a series of transformations in the meaning of cryptography in the 1960s and 1970s that led to the declaration of a revolution. Drawing on archival materials, the article considers how public key cryptography was the product of an emerging consensus among cryptographers of the importance of privacy in the wake of abuses of surveillance powers by government agencies. Shaped by a changing technological and political environment, it situates cryptography at the center of a focused effort to assert control over information in an era of sociopolitical upheaval, concluding that the invention of public key encryption both marked a change in the imaginary surrounding cryptography and offered a technical solution that foreclosed other approaches to addressing the problem of surveillance.

...More
Citation URI
data.isiscb.org/p/isis/citation/CBB869396949

This citation is part of the Isis database.

Similar Citations

Article Astrid Mager; (April 2017)
Search engine imaginary: Visions and values in the co-production of search technology and Europe (/p/isis/citation/CBB569340330/) unapi

Article Evan Selinger; Darrin Durant; (2022)
Amazon’s Ring: Surveillance as a Slippery Slope Service (/p/isis/citation/CBB181826170/) unapi

Book Colin Koopman; (2019)
How We Became Our Data: A Genealogy of the Informational Person (/p/isis/citation/CBB981384434/) unapi

Article Carsten Ochs; Barbara Büttner; Jörn Lamla; (May 2021)
Trading Social Visibility for Economic Amenability: Data-based Value Translation on a “Health and Fitness Platform” (/p/isis/citation/CBB474517087/) unapi

Article Thomas Jepsen; (2014)
Reversing the whispering galley of Dionysius: A short history of electronic surveillance in the U.S. (/p/isis/citation/CBB443893857/) unapi

Thesis Kim, Richard S.Y.; (2010)
Cyber-Surveillance: A Case Study in Policy and Development (/p/isis/citation/CBB001567169/) unapi

Book Brian Hochman; (2022)
The Listeners: A History of Wiretapping in the United States (/p/isis/citation/CBB775086796/) unapi

Book Mary F. E. Ebeling; (2022)
Afterlives of Data: Life and Debt under Capitalist Surveillance (/p/isis/citation/CBB663965321/) unapi

Book Josh Lauer; Kenneth Lipartito; (2021)
Surveillance Capitalism in America (/p/isis/citation/CBB401959068/) unapi

Article Vijay Sivaraman; Hassan Habibi Gharakheili; Clinton Fernandes; Narelle Clark; Tanya Karliychuk; (June 2018)
Smart IoT Devices in the Home: Security and Privacy Implications (/p/isis/citation/CBB353680957/) unapi

Book Lennon, Brian; (2018)
Passwords: philology, security, authentication (/p/isis/citation/CBB427866448/) unapi

Article Weiner, Amir; Rahi-Tamm, Aigi; (2013)
Getting to Know You: The Soviet Surveillance System, 1939--57 (/p/isis/citation/CBB001200564/) unapi

Article Arntfield, Mike; (2008)
Wikisurveillance: A Genealogy of Cooperative Watching in the West (/p/isis/citation/CBB000932319/) unapi

Article Christy Spackman; (June 2020)
In smell’s shadow: Materials and politics at the edge of perception (/p/isis/citation/CBB826002581/) unapi

Article Kjetil Rommetveit; Niels van Dijk; (2022)
Privacy engineering and the techno-regulatory imaginary (/p/isis/citation/CBB677677741/) unapi

Article Philip Olson; Christine Labuski; (August 2018)
‘There’s always a [white] man in the loop’: The gendered and racialized politics of civilian drones (/p/isis/citation/CBB568832607/) unapi

Article Rebecca J. Hester; (2020)
Bioveillance: A Techno-security Infrastructure to Preempt the Dangers of Informationalised Biology (/p/isis/citation/CBB548068287/) unapi

Article Karin Bijsterveld; (2021)
Slicing Sound: Speaker Identification and Sonic Skills at the Stasi, 1966–1989 (/p/isis/citation/CBB388750124/) unapi

Article Darren Ellis; (2020)
Techno-Securitisation of Everyday Life and Cultures of Surveillance-Apatheia (/p/isis/citation/CBB734944273/) unapi

Article Ben Falchuk; Shoshana Loeb; Ralph Neff; (June 2018)
The Social Metaverse: Battle for Privacy (/p/isis/citation/CBB447859564/) unapi

Authors & Contributors
Arntfield, Mike
Bijsterveld, Karin
Durant, Darrin
Jepsen, Thomas C.
Kim, Richard S. Y.
Lauer, Josh
Journals
Social Studies of Science
Science as Culture
IEEE Technology and Society Magazine
Bulletin of Science, Technology & Society
Isis: International Review Devoted to the History of Science and Its Cultural Influences
Kritika: Explorations in Russian and Eurasian History
Publishers
New York, City University of
Belknap Press of Harvard University Press
Harvard University Press
University of California Press
University of Chicago Press
University of Pennsylvania Press
Concepts
Privacy
Surveillance
Science and technology studies (STS)
Technology and society
Security technologies
Communication technology
Time Periods
21st century
20th century
19th century
20th century, late
Modern
18th century
Places
United States
Europe
East Germany
Soviet Union
West Virginia (U.S.)
Institutions
Google
Amazon (Firm)
Comments

Be the first to comment!

{{ comment.created_by.username }} on {{ comment.created_on | date:'medium' }}

Log in or register to comment