Abstract
Modern (substitution) cryptography depends on a very simple concept—modular addition of unpredictable, noiselike quantities to plaintext elements. What do we mean by this and, understanding it, how do we implement it? The following example is intended to motivate the question and lead us to the answer.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Brent, R. and J. Pollard (1981), Factorization of the Eighth Fermat Number, Mathematics of Computation, Vol. 35, pp. 627–630.
DeLaurentis, J. (1984), A Further Weakness in the Common Modulus Protocol for the RSA Cryptosystem, Cryptologia, Vol. 8, pp. 253–259.
Diffie,.W. and M. Hellman (1979), Privacy and Authentication: An Introduction to Cryptography, Proceedings of the IEEE, Vol. 67, pp. 397–427.
FIPS PUB 46 (1977), Data Encryption Standard, Federal Information Processing Standards, Publication Number 46, National Bureau of Standards.
FIPS PUB 81 (1980), DES Modes of Operation, Federal Information Processing Standards, Publication Number 81, National Bureau of Standards.
Floyd, D. (1982), A Survey of the Current State of the Art in Conventional and Public Key Cryptography, Tech. Rpt. 81–10, Dept. Computer Science, University of Pittsburgh.
Henze, E. (1982), The Solution of the General Equation for Public Key Distribution Systems, IEEE Transactions on Information Theory, Vol. 28, p. 933.
Hellman, M., R. Merkle, R. Schroeppel, L. Washington, W. Diffie, S. Pohlig, and P. Schweitzer (1976), Results of an Initial Attempt to Cryptanalyze the NBS Data Encryption Standard, SEL76-042, Stanford University.
Hershey, J. (1983), The Data Encryption Standard, Telecommunications, Vol. 17, Sept., pp. 77 ff.
Karnin, E., J. Greene, and M. Hellman (1983), On Secret Sharing Systems, IEEE Transactions on Information Theory, Vol. 29, pp. 35–41.
Knuth, D. (1973), The Art of Computer Programming, Vol. 1, 2nd ed., Addison-Wesley, Reading, MA.
Merkle, R. (1978), Secure Communications Over Insecure Channels, Communications of the ACM,Vol. 21, pp. 294–299.
Morrison, M. and J. Brillhart (1975), A Method of Factoring and the Factorization of F 7 , Mathematics of Computation, Vol. 29, pp. 183–205.
Pomper, W. (1982), The DES Modes of Operation and Their Synchronization, Proceedings of the International Telemetering Conference, pp. 837–851.
Pohlig, S. (1978), An Improved Algorithm for Computing Logarithms Over GF(p) and Its Cryptographic Significance, IEEE Transactions on Information Theory, Vol. 24, pp. 106–110.
Pohlig, S. (1979), An Overview of Secure Communications Using the Discrete Exponential,EASCON Proceedings, pp. 650–652.
Rivest, R., A. Shamir, and L. Adleman (1978), A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM, Vol. 21, pp. 120–126.
Seshu, S. and M. Reed (1961), Linear Graphs and Electrical Networks, Addison-Wesley, Reading, MA.
Simmons, G. (1983), A “Weak” Privacy Protocol Using the RSA Cryptoalgorithm, Cryptologia, Vol. 7, pp. 180–182.
Simmons, G. and D. Holdridge (1982), Forward Search as a Cryptanalytic Tool Against a Public Key Privacy Channel, Proceedings of the Symposium on Security and Privacy, pp. 117–128.
Stillman, R. and C. DeFiore (1980), Computer Security and Networking Protocols: Technical Uses in Military Data Communications Networks, Transactions on Communications, Vol. 28, pp. 1472–1477.
Williams, H. (1984), An Overview of Factoring, in Advances in Cryptology, Proceedings of Crypto 83, Plenum Press, New York, pp. 71–80.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 1986 Plenum Press, New York
About this chapter
Cite this chapter
Hershey, J.E., Rao Yarlagadda, R.K. (1986). Information Protection. In: Data Transportation and Protection. Applications of Communications Theory. Springer, Boston, MA. https://doi.org/10.1007/978-1-4613-2195-8_10
Download citation
DOI: https://doi.org/10.1007/978-1-4613-2195-8_10
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4612-9290-6
Online ISBN: 978-1-4613-2195-8
eBook Packages: Springer Book Archive