Skip to main content

Computer Security and Public Key Cryptography

  • Chapter
  • First Online:
Computer Science
  • 4153 Accesses

Abstract

The problem of computer security arises in several contexts in this modern age where most computers are connected to the Internet. Being connected is of course valuable but it also means that the computer is liable to invasion by unfriendly external agents (sometimes called hackers) which inject viruses, which are insidious programs that can insert themselves into a computer’s operating system and cause serious damage in its executable functions and also possibly access confidential files. This raises problems in computer security. The problem of virus protection is treated by several software companies who sell their products to the computer owner. In this chapter, we are interested in another aspect of computer security which the computer owner can deal with directly. This is the problem of confidential (or secret) encrypted email. We have already mentioned that Turing worked on cryptography in World War 2.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    see http://www.certicom.com/index.php/news/6-press-rreleases/314-certicom-sells-licensing-rights-to-nsa, http://www.certicom.com/index.php/2005-press-releases/35-2005-press-releases/267-certicoms-ecc-based-solutions-enable-government-contractors-to-add-security-that-meets-nsa-guidelines-

References

  • Dickson, Leonard Eugene. Introduction to the Theory of Numbers. University of Chicago Press, 1929

    Google Scholar 

  • Koblitz, Neal. Miracles of the Height Function: A Golden Shield Protecting ECC, 4th workshop on Elliptic Curve Cryptography (ECC 2000). [Slides from a talk.] www.cacr.math.uwaterloo.ca/conferences/2000/ecc2000/koblitz.ps

  • Menezes A, Okamoto T, Vanstone S, 1993. Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Trans. Inform. Theory 39, 1639–1646

    Google Scholar 

  • Ronald Rivest, Adi Shamir, and Leonard Adleman. Public Key Cryptography, Communications of the ACM, Feb. 1978.

    Google Scholar 

  • Smart NP, 1999. The Discrete Logarithm Problem on Elliptic Curves of Trace One. J. Cryptology 12(3), 193–196

    Google Scholar 

  • Whitfield Diffie and Martin Hellman. New Directions in Cryptography. IEEE Transactions on Information Theory, Nov. 1976.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wayne Raskind .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Raskind, W., Blum, E.K. (2011). Computer Security and Public Key Cryptography. In: Blum, E., Aho, A. (eds) Computer Science. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-1168-0_11

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-1168-0_11

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-1167-3

  • Online ISBN: 978-1-4614-1168-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics