Advertisement

Journal of Cryptographic Engineering

, Volume 9, Issue 1, pp 85–100 | Cite as

Horst Feistel: the inventor of LUCIFER, the cryptographic algorithm that changed cryptology

  • Alan G. KonheimEmail author
Regular Paper

Abstract

This paper documents the early life of Horst Feistel, in particular, the events shaping his career. His creativity led to the development of today’s high-grade cryptographic algorithms. We describe Feistel’s successful escape from Nazi Germany, his university training in physics in Zürich and in Boston, and the career change to cryptography. Feistel became a Research Staff Member at the IBM Thomas J. Watson Research Center in Yorktown Heights, New York, in 1968. The cryptographic algorithm LUCIFER encrypts data to secure their contents. It embodies the ideas intrinsic in Feistel’s 1971 IBM patent. Claude Shannon’s 1949 prescription for achieving ideal secrecy was the basis for LUCIFER and its successors DES, 3DES and AES. DES authenticated transactions in the automated teller machine system developed by IBM as part of the Lloyds Bank Cashpoint System in England. Public key cryptography and advances in communication networks would provide a means to secure credit card transactions and lead to a lucrative environment for E-Commerce. The availability of high-grade encryption appears to have drastically limited the National Security Agency’s Signals Intelligence mission. The Department of Justice’s dispute with Apple’s iPhone is an attempt to restrict the commercial availability of high-grade encryption algorithms. It signals the struggle between privacy and national security.

Keywords

Cryptography DES 3DES AES Horst Feistel LUCIFER NSA 

Notes

Acknowledgements

I am particularly grateful for the assistance given by my former UCSB student and later colleague Çetin Kaya Koç, editor-in-chief of the Journal of Cryptographic Engineering, who invited the submission of this paper, Ms. Peggy Gertrude Chester (née Feistel) and Ms. Dawn Stafford (IBM Corporate Archives). Some of the documents Ms. Chester provided were in German. Although my career included a Fulbright (1966–7) at Institut für reine und angewandte Mathematik (Heidelberg Heidelberg) and a sabbatical 1970–1 at IBM's Ruschlikon Laboratory, my languages skills had declined. Two longtime friends and colleagues corrected my faulty translations: Dr. Joachim Hagenauer (Joachim, a friend and fellow cook for 25 years, not only translated many documents but outperformed Google maps and provided a link to Stonischken, the birthplace of Horst’s mother and aunt), Professor Emeritus at Institute of Communication Engineering at the Technical University of Munich, and Dr. Eberhard Hänsler (Eberhard is a friend since IBM days and translated many of Peggy Feistel’s documents), Professor Emeritus at the Institute of Telecommunications at the Technical University of Darmstadt.

References

  1. 1.
    Feistel, H., Notz, W.A., Smith, J.L.: Some cryptographic technique for machine-to-machine data communications. Proc. IEEE 63(11), 1545–1554 (1975)CrossRefGoogle Scholar
  2. 2.
    Bamford, J.: The Puzzle Palace. Houghton Mifflin, Boston (1982)Google Scholar
  3. 3.
    Levy, Steven: Crypto: How the code rebels beat the government—saving privacy in the digital age. Viking, New York (2001)Google Scholar
  4. 4.
    Albert, N.: A3 and His Algebra: How a Boy from Chicago’s West Side Became a Force in American Mathematics. iUniverse, New York (2005)zbMATHGoogle Scholar
  5. 5.
    IBM Corporation z/OS Cryptographic Services ICSF Application Programmer’s Guide: IBM PIN Algorithms SA22-7522-16bGoogle Scholar
  6. 6.
    Konheim, Alan G.: Automated teller machines their history and authentication protocols. J. Cryptogr. Eng. 36(2), 1–29 (2016)CrossRefGoogle Scholar
  7. 7.
    Konheim, Alan G.: The impetus to creativity in technology. Cryptologia 39(4), 1–25 (2015)CrossRefGoogle Scholar
  8. 8.
    Kahn, David: The Codebreakers (The Story of Secret Writing). The MacMillan Company, New York (1967)Google Scholar
  9. 9.
    Feistel, H.: A Survey of Problems in Authenticated Communication and Control, MIT Lincoln Laboratory, pp. 1–111, 20 May 1958Google Scholar
  10. 10.
    Shannon, C.E.: The theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656–715 (1949)MathSciNetCrossRefzbMATHGoogle Scholar
  11. 11.
    Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27(3), 379–423 (1948)MathSciNetCrossRefzbMATHGoogle Scholar
  12. 12.
    National Bureau of Standards (NBS), FIPS Publication 46-1, Data Encryption Standard (DES), NBS, January 22, 1988. FIPS 46-1 superseded by FIPS Publication 46-2, 30 Dec 1993, and reaffirmed as FIPS PUB 46-2, October 25, 1999. NBS, FIPS Publication 140-1: Security Requirements for Cryptographic Modules, 11 Jan 1994Google Scholar
  13. 13.
    Shane, S. and Bowman T., 3–18 Dec 1995. No Such Agency (in six parts), The Baltimore Sun, pp. 1–16Google Scholar
  14. 14.
    Konheim, A.G.: Computer Security and Cryptography. Wiley, Hoboken (2007). (Chinese translation published in 2011) CrossRefGoogle Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Computer ScienceUniversity of CaliforniaSanta BarbaraUSA

Personalised recommendations