THE PATH TO USER OWNED AI #7
The 1980s: First steps towards building digital open-source trust
The 1980s were a transformative decade that set the stage for the digital world we inhabit today. Cryptography transitioned from academic theory to practical application, personal computing became a household phenomenon, and the open-source movement laid the philosophical and technical foundations for collaborative innovation. These developments not only defined the decade but also catalyzed the rise of cryptocurrencies, artificial intelligence (AI), and the internet.
Cryptography Matures: Building Digital Trust
The 1980s saw cryptographic theory evolve into practical systems that secured the burgeoning digital landscape. Public-key cryptography, first introduced in the 1970s, became widely adopted during this era, enabling secure communication and e-commerce.
One of the decade’s defining moments was the rise of the RSA algorithm, developed in 1977 but gaining traction in the 1980s. RSA was critical for encrypting sensitive information, securing emails, and enabling digital signatures. Its robust security, rooted in the mathematical difficulty of factoring large primes, became a cornerstone of public-key infrastructure (PKI).
Digital signatures were also formalized during this time, enabling tamper-proof authentication of documents and messages. This innovation laid the groundwork for trustless systems like blockchain, where transactions can be verified without centralized intermediaries.
The steps of the RSA Algorithm:
1. Key Generation
The RSA algorithm begins with generating a pair of cryptographic keys: a public key for encryption and a private key for decryption. This process involves the following steps:
- Select Two Large Prime Numbers (p and q):
- Choose two distinct large prime numbers, ppp and qqq. The security of RSA relies on these primes being sufficiently large and randomly selected.
2. Compute the Modulus (n):
Multiply ppp and qqq to get nnn: n=p×qn = p \times qn=p×q
nnn is used as part of both the public and private keys.
3. Calculate Euler’s Totient (ϕ(n)\phi(n)ϕ(n)):
Compute the totient of nnn, which is the number of integers less than nnn that are relatively prime to nnn: ϕ(n)=(p−1)×(q−1)\phi(n) = (p — 1) \times (q — 1)ϕ(n)=(p−1)×(q−1)
4. Choose the Public Exponent (e):
Select an integer eee such that 1<e<ϕ(n)1 < e < \phi(n)1<e<ϕ(n) and eee is coprime with ϕ(n)\phi(n)ϕ(n). A common choice is e=65537e = 65537e=65537, as it balances efficiency and security.
5. Calculate the Private Exponent (d):
- Compute ddd, the modular multiplicative inverse of eee modulo ϕ(n)\phi(n)ϕ(n): d×emod ϕ(n)=1d \times e \mod \phi(n) = 1d×emodϕ(n)=1
- This ensures that ddd is the unique integer satisfying this equation.
The public key consists of (e,n)(e, n)(e,n), while the private key is (d,n)(d, n)(d,n).
2. Encryption
To encrypt a message mmm (where m<nm < nm<n) using the public key (e,n)(e, n)(e,n):
- Convert the message into a numeric format mmm (e.g., using ASCII encoding).
- Apply the encryption formula: c=memod nc = m^e \mod nc=memodn Here, ccc is the resulting ciphertext, which can be safely transmitted over an insecure channel.
3. Decryption
To decrypt the ciphertext ccc using the private key (d,n)(d, n)(d,n):
- Apply the decryption formula: m=cdmod nm = c^d \mod nm=cdmodn
- The result mmm is the original plaintext message, which can be converted back into its original form.
4. Digital Signatures
RSA also supports digital signatures, which verify the authenticity of a message:
- Signing:
- The sender uses their private key (d,n)(d, n)(d,n) to create a signature: s=mdmod ns = m^d \mod ns=mdmodn
- The signature sss is sent along with the message.
2. Verification:
- The receiver uses the sender’s public key (e,n)(e, n)(e,n) to verify the signature: m=semod nm = s^e \mod nm=semodn
- If the computed mmm matches the original message, the signature is valid, confirming the sender’s identity and the message’s integrity.
In 1989, Phil Zimmermann’s creation of Pretty Good Privacy (PGP) brought robust encryption to the masses. PGP’s open-source nature made advanced cryptography accessible to individuals, democratizing security and empowering users to protect their communications in an increasingly digital world. These advancements highlighted the role of cryptographic primitives — key exchange, hashing, and digital signatures — in securing the foundations of modern technologies, from blockchain to crypto wallets.
The Personal Computing Boom: Power to the People
The 1980s were also defined by the explosion of personal computing, which put unprecedented computational power into the hands of everyday users.
The release of the IBM PC in 1981 and the Apple Macintosh in 1984 transformed computing from a specialized tool for scientists and businesses into an essential household and workplace device. These machines were not only more affordable but also user-friendly, enabling widespread adoption.
This democratization of computing power was accompanied by exponential advancements in hardware. Moore’s Law, which predicted the doubling of transistor density roughly every two years, drove innovations in processing speed and memory. These improvements allowed for increasingly sophisticated software, including cryptographic utilities, to run on personal machines.
At the high-performance end, supercomputers like the Cray-2 and the Connection Machine pushed the boundaries of computation, enabling research in parallel processing and distributed systems. These innovations paved the way for future developments in cloud computing and large-scale AI models.
The Rise of Open-Source: A Revolution in Collaboration
The 1980s were a turning point in the philosophy and practice of software development, as the principles of open-source collaboration began to take root. The movement’s origins can be traced back to the early days of computing, when researchers and hobbyists freely shared code to solve problems collectively.
The GNU Project, launched by Richard Stallman in 1983, crystallized this ethos into a formal movement. Stallman envisioned a world where software users had the freedom to run, modify, and share code without restrictions. GNU aimed to create a free operating system, and its principles laid the foundation for the General Public License (GPL), which remains a cornerstone of open-source development.
At the same time, the Berkeley Software Distribution (BSD) played a crucial role in the evolution of open-source operating systems. BSD Unix, developed at the University of California, Berkeley, became a key platform for innovation, particularly in networking. Its contributions to the development of the TCP/IP protocol stack enabled the rise of the internet.
The ethos of openness extended to cryptography, with tools like PGP and cryptographic libraries making secure communication protocols more accessible. This transparency not only accelerated adoption but also fostered trust in cryptographic standards, which are critical for today’s decentralized systems.
Foundations for the Crypto, AI, and Internet Revolution
The innovations of the 1980s in cryptography, personal computing, and open-source software were deeply interconnected, creating the infrastructure for the technological revolutions that followed.
- Cryptocurrency: The cryptographic breakthroughs of the 1980s — especially public-key infrastructure (PKI) and digital signatures — formed the backbone of blockchain technology and cryptocurrencies like Bitcoin, introduced in 2008.
- Artificial Intelligence: While the 1980s were a challenging period for AI, the advances in computing power enabled research into machine learning and neural networks, laying the groundwork for the AI resurgence in the 2000s and 2010s.
- The Internet: The adoption of TCP/IP as the standard networking protocol, rooted in 1980s research, allowed disparate computer systems to communicate seamlessly. Cryptographic protocols like SSL/TLS, developed in the early 1990s, ensured secure data exchange over these networks, enabling e-commerce and online collaboration.
- Open-Source Collaboration: The principles championed by the GNU Project and BSD Unix fostered a culture of transparency and innovation, influencing everything from Linux to blockchain platforms and AI frameworks.
A Legacy of Innovation
The 1980s were a decade of profound transformation, bridging the theoretical and practical realms of technology. Cryptography became a practical tool for securing digital communication, personal computing empowered individuals and businesses, and open-source collaboration revolutionized how software was developed and shared.
As we navigate the interconnected, AI-driven, and decentralized world of the 21st century, the legacy of the 1980s remains unmistakable. The breakthroughs of this pivotal decade continue to shape our technological landscape, inspiring new generations to build on the foundations of trust, accessibility, and collaboration.
About NEARWEEK
NEARWEEK is the ultimate destination for all things related to NEAR. As the official NEAR Protocol newsletter and community platform, NEARWEEK is the one-stop media for everything happening in the NEAR ecosystem.
About NEAR Protocol
NEAR is on a mission to onboard a billion users to the limitless possibilities of Web3 with chain abstraction. Leveraging its high-performance, carbon-neutral protocol, which is swift, secure, and scalable, NEAR offers a common layer for browsing and discovering the Open Web.