Abstract
The problem of computer security arises in several contexts in this modern age where most computers are connected to the Internet. Being connected is of course valuable but it also means that the computer is liable to invasion by unfriendly external agents (sometimes called hackers) which inject viruses, which are insidious programs that can insert themselves into a computer’s operating system and cause serious damage in its executable functions and also possibly access confidential files. This raises problems in computer security. The problem of virus protection is treated by several software companies who sell their products to the computer owner. In this chapter, we are interested in another aspect of computer security which the computer owner can deal with directly. This is the problem of confidential (or secret) encrypted email. We have already mentioned that Turing worked on cryptography in World War 2.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Dickson, Leonard Eugene. Introduction to the Theory of Numbers. University of Chicago Press, 1929
Koblitz, Neal. Miracles of the Height Function: A Golden Shield Protecting ECC, 4th workshop on Elliptic Curve Cryptography (ECC 2000). [Slides from a talk.] www.cacr.math.uwaterloo.ca/conferences/2000/ecc2000/koblitz.ps
Menezes A, Okamoto T, Vanstone S, 1993. Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Trans. Inform. Theory 39, 1639–1646
Ronald Rivest, Adi Shamir, and Leonard Adleman. Public Key Cryptography, Communications of the ACM, Feb. 1978.
Smart NP, 1999. The Discrete Logarithm Problem on Elliptic Curves of Trace One. J. Cryptology 12(3), 193–196
Whitfield Diffie and Martin Hellman. New Directions in Cryptography. IEEE Transactions on Information Theory, Nov. 1976.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Raskind, W., Blum, E.K. (2011). Computer Security and Public Key Cryptography. In: Blum, E., Aho, A. (eds) Computer Science. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-1168-0_11
Download citation
DOI: https://doi.org/10.1007/978-1-4614-1168-0_11
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-1167-3
Online ISBN: 978-1-4614-1168-0
eBook Packages: Computer ScienceComputer Science (R0)