Skip to main content

Cryptography and Crypto-Systems

  • Conference paper
Interlinking of Computer Networks

Part of the book series: NATO Advanced Study Institutes Series ((ASIC,volume 42))

  • 90 Accesses

Abstract

In this section we shall describe what modern cryptographic methods are expected to achieve - the criteria of security they have to meet. It would be convenient if there were proofs of the security of a cryptographic algorithm but this is not so. At best they can be shown to resist the known methods of attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

General Description of Cryptographic Techniques:

  • David Kahn. The Codebreakers. Wiedenfeld & Nicholson, London 1966.

    Google Scholar 

  • H. Feistel. Cryptography and Computer Privacy. Scientific American.

    Google Scholar 

  • W. Diffie & M.E. Hellman. New Directions in Cryptography. IEEE Trans. Inf. Theory. Nov, 1976. Vol IT-22, No. 6, pp. 644–654.

    Article  MathSciNet  Google Scholar 

  • H. Feistel, W.A. Notz, J.L. Smith. Some crytographic techniques for machine to machine data communications. Proc. IEEE, Vol. 63, No. 11, Nov, 1975, pp. 1545–1554.

    Google Scholar 

  • J.H. Saltzer, M.D. Schroeder. The protection of information in computer systems. Proc. IEEE Vol.63, No.9, Sept, 1975, pp. 1278–1308.

    Google Scholar 

  • S. Jeffery. Data Integrity and Security in the EFT Interchange environment. Testimony to the National Commission on Electronic Fund Transfers, Dec, 1976.

    Google Scholar 

  • R.L. Rivest, A. Shamir amp; L. Aldeman. On Digital Signatures and Public Key Cryptosystems. Tech. Memo. 82. April 1977, Laboratory for Computer Science, MIT.

    Google Scholar 

Description of the DES:

  • US Department of Commerce/National Bureau of Standards. Data Encryption Standard. FIPS publication 46, 15th January, 1977.

    Google Scholar 

  • D. J. Sykes. Protecting Data by Encryption, Datamation, Aug, 1976, pp. 31 & 85.

    Google Scholar 

  • S. Jeffery & D.K. Branstad. Data Encryption. NBS 1976.

    Google Scholar 

  • E. K. Yasaki. Encryption Algorithm: Key Size is the thing. Datamation, March, 1976. Vol. 22,No. 3,pp. 164–166.

    Google Scholar 

Criticism of the DES

  • M. Hellman, R. Merkle, R. Schroeppel, L.Washington, W.Diffie, S.Pohling, P.Schweitzer. Results of an initial attempt to cryptanalyze the NBS data encryption standard. Publication SEL 76–042, Stanford University, California, 10th November 1976.

    Google Scholar 

  • W.Diffie & M.E. Hellman. Exhaustive Cryptanalysis of the NBS data encryption standard. Computer, June 1977, pp. 74–84.

    Google Scholar 

  • W. Diffie & M.E. Hellman. A critique of the proposed data encryption standard. Comm. Assoc. Comp. Mach. Vol. 19,No. 3, March 1976, pp. 164–165.

    Google Scholar 

  • NBS. Report of the 1976 Workshop on Estimation of Significant Advances in Computer Technology. August 30–31 1976.

    Google Scholar 

Crytography for Multiaccess

  • D. K. Branstad. Encryption Protection in Computer Data Communications Symposium. IEEE/ACM October 1975.

    Google Scholar 

  • W. Diffie & M.E. Hellman. Multiuser cryptographic techniques. AFIPS Conference Proceedings, Vol. 45, 1976, pp. 109–112.

    Google Scholar 

  • S.T. Kent. Encryption-based protection protocols for interactive user-computer communication. S.M. thesis, MIT Technical Report 162, May 1976.

    Google Scholar 

  • E. Lohse. Implementation and use of the data encryption standard within the data communications environment. Proceedings of a conference on computer security and the data encryption standard. National Bureau of Standards, 15th February 1977.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1979 D. Reidel Publishing Company, Dordrecht, Holland

About this paper

Cite this paper

Davies, D.W. (1979). Cryptography and Crypto-Systems. In: Beauchamp, K.G. (eds) Interlinking of Computer Networks. NATO Advanced Study Institutes Series, vol 42. Springer, Dordrecht. https://doi.org/10.1007/978-94-009-9431-7_13

Download citation

  • DOI: https://doi.org/10.1007/978-94-009-9431-7_13

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-009-9433-1

  • Online ISBN: 978-94-009-9431-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics