Abstract
This paper traces the development of data encipherment in the public domain, examining the available algorithms, and discusses the way in which standards for applications of data encipherment are developing. It also serves as an introduction to the two associated papers on key management and data signature.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Price, W.L. A review of the development of standards for data encipherment. Proc. NATO International Advanced Study Institute on The Impact of Processing Techniques on Communications, Bonas, France, July 1983.
Price, W.L. Key management for data encipherment. This conference
Price, W.L. Authentication and signature for message and transaction handling. This conference.
National Bureau of Standards. Data Encryption Standard. Federal Information Processing Standards Publication 46, January 15 1977.
American National Standards Institute. Data Encryption Algorithm. ANSI Standard X3. 92–1981.
Hellman, M., Merkle, R., Schroeppel, R., Washington, L., Diffie, W., Pohlig, S. & Schweitzer, P. Results of an initial attempt to cryptanalyze the NBS Data Encryption Standard. Information Systems Laboratory Report, Stanford University, November 1976.
National Bureau of Standards. Report of the Workshop on estimation of significant advances in computer technology. NBSIR 76–1189, December 1976.
Davies, D.W. Some regular properties of the Data Encryption Standard algorithm. NPL Internal Note, 1979.
Kolata, G.B. Flaws found in popular code. Science, 219, January 28 1983, PP. 369–370.
Diffie, W. & Hellman, M.E. New directions in cryptography. Trans. IEEE on Information Theory, IT-22, 6, November 1976, pp. 644–654.
Rivest, R.L., Shamir, A. & Adleman, L. A method of obtaining digital signatures and public-key cryptosystems. Comm. ACM, 21, 2, February 1978, pp. 120–126.
Schnorr, C.P. & Lenstra, H.W. A Monte Carlo factoring algorithm with finite storage. Preprint, University of Frankfurt, September 1982.
Davies, D.W. Recent developments in public key cryptosystems. NPL Report TTCC 10 /83, June 1983.
Merkle, R.C. & Hellman, M.E. Hiding information and signatures in trap-door knapsacks. Trans. IEEE on Information Theory, IT-24, 5, September 1978, pp. 525–530.
Shamir, A. A polynomial time algorithm for breaking Merkle-Hellman cryptosystems. Research announcement - preliminary draft, April 1982.
Brickell, E.F. & Simmons, G.J. A status report on knapsack based public key cryptosystems. Sandia Report SAND 83–0042, February 1983.
National Bureau of Standards. DES Modes of Operation. Federal Information Processing Standards Publication 81, 2 December 1980.
American National Standards Institute. Modes of Operation for the Data Encryption Algorithm. ANSI Standard X3. 106–1983.
Federal Telecommunications Standards Committee. Telecommunications: Interoperability and Security Requirements for Use of the Data Encryption Standard in the Physical Layer of Data Communications. Proposed Federal Standard 1026, 1983.
Ehrsam, S.M., Matyas, S.M., Meyer, C.H. & Tuchman, W.L. A cryptographic key management scheme for implementing the Data Encryption Standard. IBM Systems Journal, 17, 2, 1978, pp. 106–125.
American National Standards Institute. Financial Institution Message Authentication. ANSI Standard X9. 9–1982.
Federal Telecommunications Standards Committee. Telecommunications: General Security Requirements for Equipment Using the Data Encryption Standard. Federal Standard 1027, April 1982.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1984 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Price, W.L. (1984). An Overview of Data Encipherment in the Public Domain. In: Beauchamp, K.G. (eds) Information Technology and the Computer Network. NATO ASI Series, vol 6. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-87089-7_20
Download citation
DOI: https://doi.org/10.1007/978-3-642-87089-7_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-87091-0
Online ISBN: 978-3-642-87089-7
eBook Packages: Springer Book Archive