--- begin forwarded text


Date:         Fri, 4 Jun 1999 13:33:44 -0700
Reply-To: Law & Policy of Computer Communications
<[EMAIL PROTECTED]>
Sender: Law & Policy of Computer Communications
<[EMAIL PROTECTED]>
From: Mike Godwin <[EMAIL PROTECTED]>
Subject:      CRYPTONOMICON review
To: [EMAIL PROTECTED]

CRYPTONOMICON REVIEW
For Reason magazine
By Mike Godwin
About 2000 words

No aficionado of trendy, complex contemporary novels by writers such as
Thomas Pynchon or David Foster Wallace will be terribly surprised to come
across a work of fiction that traces a single thematic thread running
through the lives of a mathematical genius in World War II, his slightly
less gifted but equally nerdy grandson in 1999, a gung-ho marine driven by
love and morphone, and a Japanese soldier transmuted by the bestial
horrors of war.

What may be surprising to readers of Neal Stephenson's CRYPTONOMICON
is that Stephenson thinks that thread is, or should be,
cryptology -- the science (or, more accurately, the two sciences,
respectively) of encoding messages to keep them secret and of extracting
the secret messages from other people's communications.

Indeed, Stephenson's novel continually demonstrates, in a wide range of
linked scenarios that tie WWII codebreaking to the modern "cypherpunk"
effort to create a currency and an economic system that is beyond
governmental control, there's something centrally human about the
enterprise of cryptography. And it's this thesis that keeps CRYPTONOMICON
from being merely an enjoyable, exceedingly well-written, encyclopedic,
and deeply comic novel. More than all this, the book is an _important_
novel, because of the ways it touches upon a critical public issue of our
era: whether the power of cryptography can be trusted to individuals.

CRYPTONOMICON presents the reader with several entwined narratives,
switching among them on a chapter-by-chapter basis. Most of these
narratives are set in World War II, and of these the greatest number of
chapters are devoted to the adventures of two men: mathematical prodigy
and Army officer Lawrence Waterhouse and his near-antithesis, Marine
sergeant and all-around man of action Bobby Shaftoe. Both of these
characters manage to complete grand tours of the European and Pacific
theaters, but, more importantly, both demonstrate, in their respective
ways, the human capacity to extract meanings from a the chaotic and
mysterious situations generated by a world war. For Waterhouse, whose life
is dominated by his gift for mathematical reasoning, the primary challenge
is to crack Axis codes (and, secondarily, to conceal from the enemy the
fact that the codes have been cracked). For the comparatively less
cerebral and occasionally morphine-addicted Shaftoe, whose official
mission is to assist in concealing Allied codebreaking efforts (although
he does not at first realize this), the real goal is much more basic than
Waterhouse's -- throughout the war he labors to return to the
Japanese-occupied Phillipines to rescue his paramour and the child he may
have fathered with her. Where Waterhouse reflexively resorts to
mathematical models to characterize his experiences, Shaftoe turns to
poetic ones --- during his time in the Far East he's learned to compose
haiku and Stephenson has Shaftoe's individual story begin and end with
haiku. (The haiku poet can be said to be engaged in a process of encoding
a deep moment of experience into three short strings of words -- it takes
an experienced reader of haiku to decode such a poem.)

Set against the World Two narratives is a present-day story centered on
Waterhouse's grandson, Randy, a computer nerd whose own genius remains
unrealized until it is unlocked by a unique business opportunity -- Randy
is invited by a friend to take part in cryptographically facilitated
offshore "data haven" that will become the technological platform for a
totally Net-based economic system. Backing that digital monetary system
will, of course, require real-world gold. Working with Shaftoe's son and
granddaughter, Randy may have a source for that gold, if only he can
reconstruct the codebreaking efforts of his grandfather, who fifty years
ago may have uncovered a plot to collect and horde German and Japanese
gold bullion.

You'd think such a web of narratives would be hard to follow (it is
certainly difficult to summarize), but Stephenson, whose science-fiction
novels SNOW CRASH and THE DIAMOND AGE have been critical and commercial
successes despite their difficult plotting, has made a quantum jump here.
His bravura writing style, together with certain technical choices
(Stephenson tells each of his narratives in the present tense, regardless
of when they occur chronologically) are carried along so deftly by his
tight plotting that you never lose the thread.

But this is not an author who's content just to tell good stories --
throughout the book he takes on the task of explaining cryptology and
other relatively abstruse technical disciplines -- almost always in ways
that a reasonably intelligent, liberally educated adult can understand. As
I read the book I marked in the margins where Stephenson found
opportunities to explain: a) the number theory that underlies modern
cryptography, b) traffic analysis (deriving military intelligence from
where and when messages are sent and received, without actually decoding
them), c) steganography (hiding secret messages within other, nonsecret
communications), d) the electronics of computer monitors (and the security
problems created by those monitors), e) the advantages to Unix-like
operating systems, f) the theory of monetary systems, and g) the
strategies behind hi-tech business litigation. Stephenson assumes that his
readers are capable of learning the complex underpinnings of modern
technological life. For the most part he's correct, although some
otherwise intelligent readers may find a few of the mathematical
discussions tough sledding (I advise those readers to skip ahead to where
the regular prose resumes).

Stephenson's technical virtuosity is supplemented by his extensive
erudition -- one finds apparent allusions ranging from David Kahn's famous
history of cryptology, THE CODEBREAKERS to World War II narratives like
THE MAN WHO NEVER WAS, DAS BOOT, and GUADALCANAL DIARY. And his scenes are
populated with characters who could just as easily have stepped out of
P.G. Wodehouse as out of James Jones, with guest appearances by real-world
figures such as Alan Turing, Ronald Reagan, and Douglas MacArthur. There's
even a set-piece about the death of Admiral Yamamoto that could stand
alone as a short story.

This book is readable, funny, humane, literary, and technically
sophisticated (in every sense). The only open question is whether it's an
*important* book. I think it is, despite the fact that its very length
(greater than 900 pages) will be daunting to many readers. Those who doJ
read it will discover that they have begun to see cryptology -- whose
components are cryptography (the creation of ciphertexts) and
cryptanalysis (the decoding of such texts) -- as something that's not only
comprehensible by ordinary people but also something that each of us is,
in some sense, born to do. The key to this reading of the text is a
quotation from Alan Turing that appears at the very beginning of the book:

"There is a remarkably close parallel between the problems of the
physicist and those of the cryptographer. The system on which a message is
enciphered corresponds to the laws of the universe, the intercepted
messages to the evidence available, the keys for a day or a message to
important constants which have yet to be determined. The correspondence is
very close, but the subject matter of cryptography is very easily dealt
with by discrete machinery, physics not so easily."

In short, the task of making sense of the universe -- a task that, on some
level or other, is one that each of us must face -- is very much like a
decoding problem. We have to figure out what is true or meaningful based
on the inherently limited and untrustworthy evidence that the real world
provides. And one finds this theme sounded again and again --
especially when one of the Waterhouse males has to deal with the opposite
sex (which turns out to be a very special kind of cryptanalytic problem
for each of them). It is no wonder that the author named his novel
CRYPTONOMICON -- in the book's narratives, "Cryptonomicon" is the name
given to a (fictional) collection of scholarly works, compiled over
centuries, that focus on the problems of cryptanalysis. Stephenson's book,
in a different sense, is a collection of individual stories that each
provide a way into understanding a larger story, which is the crucial role
that cryptology has played in shaping the culture we live in now. A major
hint as to that role appears relatively early in the novel when Lawrence
Waterhouse first joins the cryptanalytic team at England's Bletchley Park:

"Some information comes into Waterhouse's eyes at least: on the other side
of that window, men are gathered around a machine. Most of them are
wearing civilian clothes, and they have been too busy, for too long, to
trifle much with combs and razors and shoe polish. The men are intensely
focused upon their work, which all has to do with this large machine. The
machine consists of a large framework of square steel tubing, like a
bedstead set up on one end. Metal drums with the diameter of dinner
plates, an inch or so thick, are mounted at several locations on this
framework. Paper tape has been threaded into a bewilderingly loopy
trajectory from drum to drum. It looks as if a dozen yards of tape are
required to thread the machine."

This is it in a nutshell: the confluence of the beginnings of modern
decoding, computing, and disheveled hacker culture -- it's a short step
from Bletchley Park to the personal computer, now a fixture of everyday
life in the industrialized world. And from PCs it's a short step back to
cryptology, since cheap computing makes it possible for everyone to do
cryptography more crack-proof than the most powerful encryption that
governments could do half a century ago.

This of course is a development that has troubled governments everywhere,
and the United States government in particular. Thanks to some pioneering
work done by American cryptographers only a couple of decades ago, the
knowledge and techniques necessary for encoding or scrambling the things
you write or say are no longer the sole preserve of government
intelligence agencies; in fact, they are easily reproduced and implemented
and available at low prices to most Americans today.

In a world full of governments that have grown accustomed -- even
comfortable -- in their ability to keep track of their citizens, and to
gather evidence about them when necessary, these developments are
disorienting. What happens in a world where one cannot guarantee that a
working wiretap will recover anything useful because the message traffic
on the phone in question is encrypted? What happens when the perpetrator
of a criminal threat can easily disappear from an online environment
because no one has the information necessary to track or identify him? .
And the question significantly raised by the 1999 subplot of CRYPTONOMICON
is even more troubling -- what happens when you establish a monetary
system that does not depend on government and that does not lend itself
easily to government tracking and supervision? (Short answer: large-scale
money laundering, among other things -- no wonder the international
criminal underworld evinces a deep interest in Randy Waterhouse's "data
haven" project.)

For these reasons, our government has been fighting a war against the
spread of crypographic tools. That war has been largely underpublicized,
in part because the general public has yet to deem cryptography policy a
matter of central concern. There is no groundswell of public support for
keeping encryption technologies available to everybody, nor any no crypto
equivalent of the National Rifle Association. Civil-liberties groups like
the Electronic Privacy Information Center and the ACLU are fighting the
DOJ and the NSA over this issue, but it has been a pretty lonely fight. The
U.S. government has been sufficiently successful in suppressing the spread of
encryption technologies both at home and abroad that the kinds of
protections we should have -- such as transparent encoding and decoding of
e-mail in transmission or truly secure cell phones -- are still in the
future for most of us.

Why have civil libertarians so often found cryptography issues a tough
sell? The problem is that for most people the subject seems awfully
esoteric -- codes and ciphers are what spies do, and are out of the range
of concerns for ordinary people. Or so it is thought -- CRYPTONOMICON
challenges that notion by demonstrating in countless contexts not only how
good human beings are at decoding and encoding their environments but also
how *reflexive* that process is. We can't help functioning as
cryptographers and cryptanalysts because, at bottom, that is what we as
human beings *do*. Which means that our government's current obsession
with suppression the spread of cryptographic information and tools is
really a kind of suppression of human nature -- and history tells us that
any such effort at suppressing something that *everybody* does is
invariably futile over the long run.

Will CRYPTONOMICON turn the tide of public opinion about cryptography or
inform the political will to challenge the government's anti-cryptography
policies? On the one hand, it's hard to believe that a 900-page novel of
any sort could change the political landscape in an era in which the novel
is an increasingly marginal mass-media form. Still, this book is
compulsively readable, and word of how good it is has flooded
throughout the Internet and into our literary culture ... and at this
writing Stephenson's odd duck of a book has already found its way onto the
New York Times bestseller list (it had made it to Amazon's top 100 even
before publication). Whether the book will live up to its potential to
trigger a sea-change in the cultural dialog about cryptological issues
remains to be seen, but I for one am pretty hopeful about the prospect.
------
Mike Godwin ([EMAIL PROTECTED]) is a lawyer and the author of CYBER
RIGHTS: DEFENDING FREE SPEECH IN THE DIGITAL AGE (Times Books 1998).

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: [EMAIL PROTECTED]>
The Digital Bearer Underwriting Corporation <http://www.ibuc.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'

Reply via email to