Skip to main content

Algorithms for Data Encryption

  • Conference paper
Security and Persistence

Part of the book series: Workshops in Computing ((WORKSHOPS COMP.))

Abstract

An overview of well known and not so well known data encryption systems is given. Some suggestions for their use in capability based computer systems are made and problems are pointed out.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Adleman, Rivest, Shamir “A method for obtaining digital signatures and public-key cryptosystems.” Comunications of the ACM, 1978

    Google Scholar 

  2. Brassard Modern Cryptology. New York, Berlin, 1988.

    MATH  Google Scholar 

  3. Coppersmith “Fast evaluation of logarithms in fields of characteristic two.” IEEE Transactions in Information Theory IT-30, 1984.

    Google Scholar 

  4. Diffie, Hellman “New directions in cryptography.” IEEE Transactions in Information Theory IT-22, 1976.

    Google Scholar 

  5. Fiat, Shamir How To Prove Yourself: Practical Solutions to the Identification and Signature Problems. Weizmann Institute of Science, Rehovot, 1986.

    Google Scholar 

  6. El Gamal “A public key cryptosystem and a signature scheme based on discrete logarithms.” IEEE Transactions in Information Theory.

    Google Scholar 

  7. Guillou, Quisquater A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory. In Eurocrypt, 1988.

    Google Scholar 

  8. Hellman, Merkle “Hiding information and signatures in trapdoor knapsacks.” IEEE Transactions in Information Theory IT-24, 1978.

    Google Scholar 

  9. Koblitz A Course in Number Theory and Cryptography. New York, Berlin, 1987.

    MATH  Google Scholar 

  10. Lenstra “Factoring integers with elliptic curves.” Report 86-18, Universiteit van Amstgerdam, 1986.

    Google Scholar 

  11. Massey “Logarithms in finite cyclic groups—cryptographic issues.” Proceedings of the 4th Benelux Symposium on Information Theory, 1983.

    Google Scholar 

  12. Meyer, C. Cryptography: a guide for the design and implementation of cryptographic systems. John Wiley & Sons, Inc. 1982

    Google Scholar 

  13. National Bureau of Standards Data Encryption Standard. Washington, DC, 1977.

    Google Scholar 

  14. Rosenberg MONADS-PC System Management Instructions. Newcastle, N.S.W., 1987.

    Google Scholar 

  15. Shamir “A polynomial time algorithm for breaking the basic Merkle—Helman cryptosystem.” Proceedings of the 23rd Annual Symposium on the Foundations of Computer Science, 1982.

    Google Scholar 

  16. Silverman The Arithmetic of Elliptic Curves. New York, Berlin, 1986.

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1990 British Computer Society

About this paper

Cite this paper

Müller, W. (1990). Algorithms for Data Encryption. In: Rosenberg, J., Keedy, J.L. (eds) Security and Persistence. Workshops in Computing. Springer, London. https://doi.org/10.1007/978-1-4471-3178-6_7

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-3178-6_7

  • Publisher Name: Springer, London

  • Print ISBN: 978-3-540-19646-4

  • Online ISBN: 978-1-4471-3178-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics