Firstly, this paper examines artificial intelligence and its links with the development of the human mind. The idea of Artificial Intelligence has been explored since the mid-1600s, a long time before thoughts of computers and programming. Next, this paper will discuss the connection between the human mind and cryptography, which delves into how the programming of modern machines is used to manipulate objects based on a set of rules. Finally, this paper will present the idea of using cryptography to acquire bitcoins.
History of the Human Mind and the Origin of Artificial Intelligence
Haugeland stated that we are all computers in one way or another, based on the fact that thinking and computing are very similar. Both thinking and computing involve receiving an input, manipulating the data, and providing an output. The first chapter of the book refers to medieval times, when religion dictated the propagation of acceptable knowledge of the world. Change of world knowledge came about with scientists like Copernicus, who disproved religious beliefs such as that the Earth was the center of the Universe. Using math and science, Copernicus confirmed that the Earth revolved around the Sun. Copernicus discoveries led to other scientists obtaining a new mentality that discredited some early religious beliefs. During this time, math and science emerged as a new way of thinking and solving problems. The transformation in thought and understanding is what Haugeland believed "invented” the modern mind and its potential.
It was also the time for
References: Bigalke, Ron J., Jr. "Cryptography." The Encyclopedia of Political Science. Ed. George Thomas Kurian. Vol. 1. Washington, DC: CQ Press, 2011. 364. Gale Virtual Reference Library. Web. 27 Mar. 2013. Galilei, Galileo. Il Saggiatore. Rome: Galilei, 1623. Print. Haugeland, John. Artificial Intelligence: The Very Idea. Cambridge, MA: MIT, 1985. Print. A. Bhushan Kapoor, Pramod Pandya, Joseph S. Sherif, (2011) "Cryptography: A security pillar of privacy, integrity and authenticity of data communication", Kybernetes, Vol. 40 Iss: 9/10, pp.1422 – 1439