Privacy and authentication: An introduction to cryptography

This paper presents a tutorial introduction to contemporary cryptography. The basic information theoretic and computational properties of classical and modern cryptographic systems are presented, followed by cryptanalytic examination of several important systems and an examination of the application of cryptography to the security of timesharing systems and computer networks. The paper concludes with a guide to the cryptographic literature.

[1]  R. Turn,et al.  Privacy transformations for data banks , 1899 .

[2]  Lester S. Hill Cryptography in An Algebraic Alphabet , 1929 .

[3]  Guy H. Naylor The secret war , 1940 .

[4]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[5]  Claude E. Shannon,et al.  Prediction and Entropy of Printed English , 1951 .

[6]  E. Watson Primitive Polynomials (Mod 2) , 1962 .

[7]  R. Tausworthe Random Numbers Generated by Linear Recurrence Modulo Two , 1965 .

[8]  Abraham Sinkov,et al.  Elementary Cryptanalysis: A Mathematical Approach , 1970 .

[9]  D. Kahn The codebreakers : the story of secret writing , 1968 .

[10]  James L. Massey,et al.  Shift-register synthesis and BCH decoding , 1969, IEEE Trans. Inf. Theory.

[11]  R. O. Skatrud,et al.  A consideration of the application of cryptographic techniques to data processing , 1969, AFIPS '69 (Fall).

[12]  John M. Carroll,et al.  Fast "infinite-key" privacy transformation for resource-sharing systems , 1899, AFIPS '70 (Fall).

[13]  Edward J. Groth,et al.  Generation of binary sequences with controllable complexity , 1971, IEEE Trans. Inf. Theory.

[14]  W. A. Notz,et al.  An experimental application of cryptography to a remotely accessed data system , 1972, ACM Annual Conference.

[15]  Fred A. Stahl A homophonic cipher for computational cryptography , 1973, AFIPS National Computer Conference.

[16]  C. H. Meyer Design considerations for cryptography , 1973, AFIPS National Computer Conference.

[17]  H. Feistel Cryptography and Computer Privacy , 1973 .

[18]  Edwin Weiss,et al.  A user authentication scheme not requiring secrecy in the computer , 1974, Commun. ACM.

[19]  F. MacWilliams,et al.  Codes which detect deception , 1974 .

[20]  George B. Purdy,et al.  A high security log-in procedure , 1974, Commun. ACM.

[21]  Wayne G. Barker Cryptanalysis of the Hagelin cryptograph , 1975 .

[22]  Encryption Protection in Computer Data Communications , 1975 .

[23]  Jerome H. Saltzer,et al.  The protection of information in computer systems , 1975, Proc. IEEE.

[24]  D. Coppersmith,et al.  Generators for Certain Alternating Groups with Applications to Cryptography , 1975 .

[25]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[26]  J.L. Smith,et al.  Some cryptographic techniques for machine-to-machine data communications , 1975, Proceedings of the IEEE.

[27]  Whitfield Diffie,et al.  Multiuser cryptographic techniques , 1976, AFIPS '76.

[28]  K. Kjeldsen,et al.  On the Cycle Structure of a Set of Nonlinear Shift Registers with Symmetric Feedback Functions , 1976, J. Comb. Theory, Ser. A.

[29]  Herbert S. Bright,et al.  Cryptography using modular software elements , 1899, AFIPS '76.

[30]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[31]  Edwin L. Key,et al.  An analysis of the structure and complexity of nonlinear binary sequence generators , 1976, IEEE Trans. Inf. Theory.

[32]  Ingemar Ingemarsson Analysis of secret functions with application to computer cryptography , 1976, AFIPS '76.

[33]  Ehud Gudes,et al.  The application of cryptography for data base security , 1976, AFIPS '76.

[34]  B. Gold,et al.  Digital speech networks , 1977, Proceedings of the IEEE.

[35]  Vera Pless,et al.  Encryption Schemes for Computer Confidentiality , 1977, IEEE Transactions on Computers.

[36]  Martin E. Hellman,et al.  An extension of the Shannon theory approach to cryptography , 1977, IEEE Trans. Inf. Theory.

[37]  Martin E. Hellman,et al.  A note on Wyner's wiretap channel (Corresp.) , 1977, IEEE Trans. Inf. Theory.

[38]  Adi Shamir,et al.  On Digital Signatures and Public-Key Cryptosystems. , 1977 .

[39]  G B Kolata,et al.  Computer encryption and the national security agency connection. , 1977, Science.

[40]  Whitfield Diffie,et al.  Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard , 1977, Computer.

[41]  N. J. A. Sloane,et al.  Assessment of the National Bureau of Standards Proposed Federal Data Encryption Standard , 1977, Cryptologia.

[42]  G B Kolata,et al.  Cryptography: on the brink of a revolution? , 1977, Science.

[43]  G. J. Simmons,et al.  Preliminary Comments on the M.I.T. Public-Key Cryptosystem , 1977, Cryptologia.

[44]  Stephen M. Matyas,et al.  A Cryptographic Key Management Scheme for Implementing the Data Encryption Standard , 1978, IBM Syst. J..

[45]  Michael O. Rabin,et al.  In Foundations of secure computation , 1978 .

[46]  Thomas M. Cover,et al.  A convergent gambling estimate of the entropy of English , 1978, IEEE Trans. Inf. Theory.

[47]  D. N. Gregory,et al.  Communications Equipment and Systems , 1978 .

[48]  Robert H. Morris The Hagelin Cipher Machine (M-209) Reconstruction of the Internal Settings , 1978, Cryptologia.

[49]  Ralph C. Merkle,et al.  Secure communications over insecure channels , 1978, CACM.

[50]  A. Gersho,et al.  Unclassified summary: Involvement of NSA in the development of the data encryption standard , 1978, IEEE Communications Society Magazine.

[51]  Stephen M. Matyas,et al.  Generation, Distribution, and Installation of Cryptographic Keys , 1978, IBM Syst. J..

[52]  Adi Shamir A Fast Signature Scheme , 1978 .

[53]  Richard E. Lennon Cryptography Architecture for Information Security , 1978, IBM Syst. J..

[54]  Paul Kinnucan,et al.  Data Encryption Gurus: Tuchman and Meyer , 1978, Cryptologia.

[55]  Roger M. Needham,et al.  Using encryption for authentication in large networks of computers , 1978, CACM.

[56]  Ronald L. Rivest,et al.  Remarks on a Proposed Cryptanalytic Attack on the M.I.T. Public-Key Cryptosystem , 1978, Cryptologia.

[57]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[58]  Martin E. Hellman,et al.  Hiding information and signatures in trapdoor knapsacks , 1978, IEEE Trans. Inf. Theory.

[59]  Martin E. Hellman,et al.  An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (Corresp.) , 1978, IEEE Trans. Inf. Theory.

[60]  AARON D. WYNER An analog scrambling scheme which does not expand bandwidth, Part II: Continuous time , 1979, IEEE Trans. Inf. Theory.