Cryptology in Transition

This work is intended to convey to the reader the phase of transition that public cryptology is in at the present time and the evolving state of the art. The transition is multifaceted: In scope of relevancy it has evolved from a government monopoly dealing with military and diplomatic communications to a major concern of business in general, the banking industry in particular, and, more recently, the public at large. Its technology has expanded from paper-andpencil and various mechanical devices to large, high-speed, electronic computers. Its security emphasis has changed from statistical uncertainty to computational complexity. And last, but not least, in concept it has developed from conventional, private-key schemes to public-key cryptosystems providing instant privacy and twoway authentication. This latest transition also reflects the rapidly evolving state of the "art" of cryptology. Since its recent adoption by the

[1]  Whitfield Diffie,et al.  Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard , 1977, Computer.

[2]  Nicholas J. Patterson,et al.  The algebraic decoding of Goppa codes , 1975, IEEE Trans. Inf. Theory.

[3]  G B Kolata,et al.  Cryptography: on the brink of a revolution? , 1977, Science.

[4]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[5]  H. Feistel Cryptography and Computer Privacy , 1973 .

[6]  Donald Ervin Knuth,et al.  The Art of Computer Programming , 1968 .

[7]  Michael O. Rabin Complexity of computations , 1977, CACM.

[8]  D. Kahn The codebreakers : the story of secret writing , 1968 .

[9]  Martin E. Hellman,et al.  Hiding information and signatures in trapdoor knapsacks , 1978, IEEE Trans. Inf. Theory.

[10]  Gary L. Miller,et al.  Riemann's Hypothesis and tests for primality , 1975, STOC.

[11]  M.E. Hellman,et al.  Privacy and authentication: An introduction to cryptography , 1979, Proceedings of the IEEE.

[12]  N. J. A. Sloane,et al.  Assessment of the National Bureau of Standards Proposed Federal Data Encryption Standard , 1977, Cryptologia.

[13]  Ralph C. Merkle,et al.  Secure communications over insecure channels , 1978, CACM.

[14]  Ronald L. Rivest,et al.  Remarks on a Proposed Cryptanalytic Attack on the M.I.T. Public-Key Cryptosystem , 1978, Cryptologia.

[15]  G B Kolata Cryptology: A Secret Meeting at IDA? , 1978, Science.

[16]  Alfred V. Aho,et al.  The Design and Analysis of Computer Algorithms , 1974 .

[17]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[18]  G B Kolata,et al.  Computer encryption and the national security agency connection. , 1977, Science.

[19]  Stephen M. Matyas,et al.  Generation, Distribution, and Installation of Cryptographic Keys , 1978, IBM Syst. J..

[20]  G. J. Simmons,et al.  Preliminary Comments on the M.I.T. Public-Key Cryptosystem , 1977, Cryptologia.

[21]  Volker Strassen,et al.  A Fast Monte-Carlo Test for Primality , 1977, SIAM J. Comput..

[22]  Stephen M. Matyas,et al.  A Cryptographic Key Management Scheme for Implementing the Data Encryption Standard , 1978, IBM Syst. J..

[23]  Martin E. Hellman,et al.  An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (Corresp.) , 1978, IEEE Trans. Inf. Theory.

[24]  Vera Pless,et al.  Encryption Schemes for Computer Confidentiality , 1977, IEEE Transactions on Computers.

[25]  Martin E. Hellman,et al.  An extension of the Shannon theory approach to cryptography , 1977, IEEE Trans. Inf. Theory.

[26]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[27]  Elwyn R. Berlekamp,et al.  On the inherent intractability of certain coding problems (Corresp.) , 1978, IEEE Trans. Inf. Theory.