Encryption Security

  • Friedrich L. Bauer


Passwords serve to select a method from a class of methods, and keys especially to select encryption steps from an encryption system. It is wise to assume pessimistically that the enemy knows what method has been chosen — there are not too many of them, and most cryptographers are familiar with only a few. The ‘basic law of cryptology’, which Kerckhoffsl had formulated as “il faut qu’il puisse sans inconvénient tomber entre les mains de l’ennemi” was expressed more succinctly by Shannon in 1949: “the enemy knows the system being used.” It follows that one must be particularly careful in the choice of a key. It is a serious mistake to use obvious words. Porta gave the express warning: “the further removed the key words are from common knowledge, the greater the security they provide.” The use of keys had hardly become common practice before unauthorized persons succeeded in decrypting messages by guessing the key word.


Probable Word Code Book Encrypt Message Commercial Vendor National Security Agency 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 1997

Authors and Affiliations

  • Friedrich L. Bauer
    • 1
  1. 1.Department of Computer ScienceMunich Institute of TechnologyMünchenGermany

Personalised recommendations