Archive for the 'Review' Category

I’ve finally succumbed

November 5, 2008

I took this photo over lunch, and wrote this post directly from my phone. That’s right – I finally bought an iPhone.



December 3, 2006


I’m in Leipzig, Germany at the moment. Last night I went to Bimbotown, which is both a nightclub and a physical manifestation of everything that’s right about this city.

It’s an abandoned warehouse on the edge of town, absolutely enormous, and full of industrial machinery and detritus. Despite it’s size, there’s no big empty space like in an English club – most of the main room is full of coffee tables, armchairs and sofas.

Around the edge you get these crazy contraptions made of old hydraulic systems. Most of the sofas and armchairs buck like a startled horse at random intervals. The bar stools leap into the air when people on the other side of the room press buttons. There’s a coffee table that walks.

There’s a convoy of beds that drive themselves around the entire club, occasionally dissapearing through a hole in the wall to emerge somewhere else a few minutes later. We took a ride on one and it carried us across the dance floor, bumping people out of the way.

I tried to tell people how crazy this was, and how impossible this would be in the UK or the US. We have a nanny state, and it doesn’t take well to this kind of thing.

A couch descends from the roof, about to land on someones head, and a guy just taps her on the shoulder to let her know. In the UK there would have to be safety barriers, alarms, helmets and safety stewards. You have to cling on to the sofa if you’re riding it – in England there would have to be harnesses.

The way it’s run wouldn’t work here either – the people who organise it live in the place, and run this night once a month to make some money. In the UK this place would have been commercialised to death, opened every night and been ruined within a year.

All this craziness was supplemented with VJing from Piotr Baran, a set from Surf Punk band Yucca Spiders and various performance artists.

If you come to Liepzig, then time it so you can go to Bimbotown.

Book Review – The Science of Secrecy, by Simon Singh

March 8, 2006

‘The Science of Secrecy: The History of Codes and Codebreaking’
Simon Singh

ISBN: 1841154350

Read this review on Slashdot.

Ever since the first codes and ciphers were developed, there has been a battle between those who want to keep their information secret, and those who want to read that information. It has been a purely intellectual war, but one that is often driven by motives from above that are far more violent. This book chronicles that battle, from it’s inception, to the modern day, and outlines the techniques used to obfuscate information, and the fascinating history of the application of those techniques.

Cryptography has been a tool largely used by governments to avoid their communications being read by the enemy or other unfriendly states, but historically it has also been utilised by individuals to protect their more questionable or taboo activities from discovery.

This battle is presented in the book as a rather bipolar trend; cryptographers trying to protect data and crypt-analysts trying to discover the meaning of that data. I found this to be slightly misleading. The representation of the history of the field as a constant struggle between two distinct parties does make for a more entertaining read, and adds an element of conflict by conjuring images of an ancient and continual intellectual game, but in reality these two groups are often one and the same.

Whilst I admit that the race to develop stronger codes and ciphers was in many ways separate from the race to break them, they were also inextricably linked, and undertaken by the same people. One has to allow a certain amount of poetic license in popular science books, especially in this case, as it has lightened what could have been a dry topic.

The way in which the book is structured allows a complete novice access. Starting from the first discoveries in cryptography and working forward chronologically, whilst explaining the method behind the discoveries, educates the reader in basic technique without effort. One reads a fascinating historical account, and later realises that they now have a good understanding of the mathematical concepts behind these approaches they’ve been reading of.

The book places these techniques into context, giving historical examples of their use. Often they are revealed to have played large and important parts in famous events, ranging from wars and political plots, to events which are not even strictly related to cryptography.

For example is is shown how crypt-analytic approaches were utilised in the decipherment of ancient languages such as hieroglyphics. These languages are dead, in that there are no living individuals who have the ability to read them, and no information was available to help in their decipherment. By studying the frequency of letters or symbols in the text, as when attempting to break a cipher, it was possible to slowly read meaning into the text, and map the alphabet.

Many of these scripts were decrypted by amateur crypt-analysts, rather than academics. One point the author makes is that there are still many that remain a mystery, such as the Etruscan and Indus scripts. One has to wonder whether a book like this, combined with the current national fixation with puzzles such as Soduko, would create a resurgence in interest, and lead to some of these being broken.

One interesting point that the book makes is that the vast majority of work performed by cryptographers is done in secret, largely for security agencies all over the world, and that this has been true for some time. Therefore it is not uncommon for crypt-analysts to receive no recognition for their work, or to have a discovery attributed to them long after their death. These organizations must classify the work in the interest of national security, so in a way this book stands as an anonymous tribute to their cunning and multidisciplinary talent.

Examples from the book of such discoveries include Charles Babbage breaking the Vigenere cipher in 1854, which only came to light in the 1970s. The author suggests that the work was kept secret to aid the Royal Navy, as it occurred just after the Crimean War started. The credit for the discovery instead fell to a retired Prussian army officer who independently discovered it in 1863.

This is shown to be one of the enduring themes of the story of cryptography, leading right through to the 1970s where credit for developing the RSA cryptographic technique went to Diffie, Hellman and Merkle in 1975, despite being developed in 1969 at GCHQ, a fact that was only publicly admitted in 1997.

A section of the book that will be of particular appeal to computer scientists is where cryptography is shown to have given birth to computing. Born from the desire for a method to perform simple operations on numbers very quickly. Computers now dominate the field of cryptography and crypt-analysis, and their ability to perform a task millions of times with no errors has transformed the science. It is also noted how much we rely on cryptography daily, in areas such as e-commerce, where our details are encrypted without us even being aware of the fact.

The final chapter is an examination into the politics of cryptography, and a balanced look into the ethical implications of governmental snooping on communication, versus the possible benefits of reducing serious crime and terrorism. This is clearly a very pertinent point in todays political climate, and a balanced look at this issue is a very valuable thing. With the heightened risk of terrorist attack, or at least the public perception of such, the government are intercepting more and more communications for analysis, and encryption by criminals is becoming more and more popular.

The book covers the topic well; from governmental use, to anecdotes about lovers exchanging secret messages. Throughout this the reader is constantly being eased into the mathematical technique behind, in a manner that does not require a background in mathematics. There is an appendix to the book, in the form of 5 cipher challenges for the reader to attempt to crack. The knowledge gleaned from the book should be preparation enough to do so, and will fascinate the curious nature of the books audience.

Buy the book on Amazon.

Humument – Book Within Books

February 22, 2006

Copyright is a major part of creation now, whether you write software, poetry, websites, novels, or create music you have to worry about copyright. A fine example of what can be produced if these constraints are lifted is Tom Phillip’s creation, Humument. Basically, by obscuring pages, but leaving some words exposed, he has created a story within a story. The original text is a Victorian novel; W.H. Mallock’s, A Human Document, written in 1892 and bought by Phillips in Peckham Rye for 3 pence. It has been turned into hundreds of pieces of visual art, with every page being a delight to the eye, but has also been turned into a new text. It’s a beatiful example of a combination of works, as with mashups, but with the bizarre twist that the new text is entirely dependant upon the original, yet entirely seperate too.