Skip to main content

An Overview of Data Encipherment in the Public Domain

  • Conference paper
  • 92 Accesses

Part of the book series: NATO ASI Series ((NATO ASI F,volume 6))

Abstract

This paper traces the development of data encipherment in the public domain, examining the available algorithms, and discusses the way in which standards for applications of data encipherment are developing. It also serves as an introduction to the two associated papers on key management and data signature.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Price, W.L. A review of the development of standards for data encipherment. Proc. NATO International Advanced Study Institute on The Impact of Processing Techniques on Communications, Bonas, France, July 1983.

    Google Scholar 

  2. Price, W.L. Key management for data encipherment. This conference

    Google Scholar 

  3. Price, W.L. Authentication and signature for message and transaction handling. This conference.

    Google Scholar 

  4. National Bureau of Standards. Data Encryption Standard. Federal Information Processing Standards Publication 46, January 15 1977.

    Google Scholar 

  5. American National Standards Institute. Data Encryption Algorithm. ANSI Standard X3. 92–1981.

    Google Scholar 

  6. Hellman, M., Merkle, R., Schroeppel, R., Washington, L., Diffie, W., Pohlig, S. & Schweitzer, P. Results of an initial attempt to cryptanalyze the NBS Data Encryption Standard. Information Systems Laboratory Report, Stanford University, November 1976.

    Google Scholar 

  7. National Bureau of Standards. Report of the Workshop on estimation of significant advances in computer technology. NBSIR 76–1189, December 1976.

    Google Scholar 

  8. Davies, D.W. Some regular properties of the Data Encryption Standard algorithm. NPL Internal Note, 1979.

    Google Scholar 

  9. Kolata, G.B. Flaws found in popular code. Science, 219, January 28 1983, PP. 369–370.

    Google Scholar 

  10. Diffie, W. & Hellman, M.E. New directions in cryptography. Trans. IEEE on Information Theory, IT-22, 6, November 1976, pp. 644–654.

    Article  MathSciNet  Google Scholar 

  11. Rivest, R.L., Shamir, A. & Adleman, L. A method of obtaining digital signatures and public-key cryptosystems. Comm. ACM, 21, 2, February 1978, pp. 120–126.

    Article  MathSciNet  MATH  Google Scholar 

  12. Schnorr, C.P. & Lenstra, H.W. A Monte Carlo factoring algorithm with finite storage. Preprint, University of Frankfurt, September 1982.

    Google Scholar 

  13. Davies, D.W. Recent developments in public key cryptosystems. NPL Report TTCC 10 /83, June 1983.

    Google Scholar 

  14. Merkle, R.C. & Hellman, M.E. Hiding information and signatures in trap-door knapsacks. Trans. IEEE on Information Theory, IT-24, 5, September 1978, pp. 525–530.

    Google Scholar 

  15. Shamir, A. A polynomial time algorithm for breaking Merkle-Hellman cryptosystems. Research announcement - preliminary draft, April 1982.

    Google Scholar 

  16. Brickell, E.F. & Simmons, G.J. A status report on knapsack based public key cryptosystems. Sandia Report SAND 83–0042, February 1983.

    Google Scholar 

  17. National Bureau of Standards. DES Modes of Operation. Federal Information Processing Standards Publication 81, 2 December 1980.

    Google Scholar 

  18. American National Standards Institute. Modes of Operation for the Data Encryption Algorithm. ANSI Standard X3. 106–1983.

    Google Scholar 

  19. Federal Telecommunications Standards Committee. Telecommunications: Interoperability and Security Requirements for Use of the Data Encryption Standard in the Physical Layer of Data Communications. Proposed Federal Standard 1026, 1983.

    Google Scholar 

  20. Ehrsam, S.M., Matyas, S.M., Meyer, C.H. & Tuchman, W.L. A cryptographic key management scheme for implementing the Data Encryption Standard. IBM Systems Journal, 17, 2, 1978, pp. 106–125.

    Article  Google Scholar 

  21. American National Standards Institute. Financial Institution Message Authentication. ANSI Standard X9. 9–1982.

    Google Scholar 

  22. Federal Telecommunications Standards Committee. Telecommunications: General Security Requirements for Equipment Using the Data Encryption Standard. Federal Standard 1027, April 1982.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1984 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Price, W.L. (1984). An Overview of Data Encipherment in the Public Domain. In: Beauchamp, K.G. (eds) Information Technology and the Computer Network. NATO ASI Series, vol 6. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-87089-7_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-87089-7_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-87091-0

  • Online ISBN: 978-3-642-87089-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics