Abstract
In this section we shall describe what modern cryptographic methods are expected to achieve - the criteria of security they have to meet. It would be convenient if there were proofs of the security of a cryptographic algorithm but this is not so. At best they can be shown to resist the known methods of attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
General Description of Cryptographic Techniques:
David Kahn. The Codebreakers. Wiedenfeld & Nicholson, London 1966.
H. Feistel. Cryptography and Computer Privacy. Scientific American.
W. Diffie & M.E. Hellman. New Directions in Cryptography. IEEE Trans. Inf. Theory. Nov, 1976. Vol IT-22, No. 6, pp. 644–654.
H. Feistel, W.A. Notz, J.L. Smith. Some crytographic techniques for machine to machine data communications. Proc. IEEE, Vol. 63, No. 11, Nov, 1975, pp. 1545–1554.
J.H. Saltzer, M.D. Schroeder. The protection of information in computer systems. Proc. IEEE Vol.63, No.9, Sept, 1975, pp. 1278–1308.
S. Jeffery. Data Integrity and Security in the EFT Interchange environment. Testimony to the National Commission on Electronic Fund Transfers, Dec, 1976.
R.L. Rivest, A. Shamir amp; L. Aldeman. On Digital Signatures and Public Key Cryptosystems. Tech. Memo. 82. April 1977, Laboratory for Computer Science, MIT.
Description of the DES:
US Department of Commerce/National Bureau of Standards. Data Encryption Standard. FIPS publication 46, 15th January, 1977.
D. J. Sykes. Protecting Data by Encryption, Datamation, Aug, 1976, pp. 31 & 85.
S. Jeffery & D.K. Branstad. Data Encryption. NBS 1976.
E. K. Yasaki. Encryption Algorithm: Key Size is the thing. Datamation, March, 1976. Vol. 22,No. 3,pp. 164–166.
Criticism of the DES
M. Hellman, R. Merkle, R. Schroeppel, L.Washington, W.Diffie, S.Pohling, P.Schweitzer. Results of an initial attempt to cryptanalyze the NBS data encryption standard. Publication SEL 76–042, Stanford University, California, 10th November 1976.
W.Diffie & M.E. Hellman. Exhaustive Cryptanalysis of the NBS data encryption standard. Computer, June 1977, pp. 74–84.
W. Diffie & M.E. Hellman. A critique of the proposed data encryption standard. Comm. Assoc. Comp. Mach. Vol. 19,No. 3, March 1976, pp. 164–165.
NBS. Report of the 1976 Workshop on Estimation of Significant Advances in Computer Technology. August 30–31 1976.
Crytography for Multiaccess
D. K. Branstad. Encryption Protection in Computer Data Communications Symposium. IEEE/ACM October 1975.
W. Diffie & M.E. Hellman. Multiuser cryptographic techniques. AFIPS Conference Proceedings, Vol. 45, 1976, pp. 109–112.
S.T. Kent. Encryption-based protection protocols for interactive user-computer communication. S.M. thesis, MIT Technical Report 162, May 1976.
E. Lohse. Implementation and use of the data encryption standard within the data communications environment. Proceedings of a conference on computer security and the data encryption standard. National Bureau of Standards, 15th February 1977.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1979 D. Reidel Publishing Company, Dordrecht, Holland
About this paper
Cite this paper
Davies, D.W. (1979). Cryptography and Crypto-Systems. In: Beauchamp, K.G. (eds) Interlinking of Computer Networks. NATO Advanced Study Institutes Series, vol 42. Springer, Dordrecht. https://doi.org/10.1007/978-94-009-9431-7_13
Download citation
DOI: https://doi.org/10.1007/978-94-009-9431-7_13
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-009-9433-1
Online ISBN: 978-94-009-9431-7
eBook Packages: Springer Book Archive