Skip to main content

Encryption Security

  • Chapter
Decrypted Secrets
  • 130 Accesses

Abstract

Passwords serve to select a method from a class of methods, and keys especially to select encryption steps from an encryption system. It is wise to assume pessimistically that the enemy knows what method has been chosen—there are not too many of them, and most cryptographers are familiar with only a few. The ‘basic law of cryptology’, which Kerckhoffs1 had formulated as “il faut qu’il puisse sans inconvénient tomber entre les mains de l’ennemi” was expressed more succinctly by Shannon in 1949: “the enemy knows the system being used.” It follows that one must be particularly careful in the choice of a key. It is a serious mistake to use obvious words. Porta gave the express warning: “the further removed the key words are from common knowledge, the greater the security they provide.” The use of keys had hardly become common practice before unauthorized persons succeeded in decrypting messages by guessing the key word.

Even in cryptology, silence is golden.

Laurence D. Smith

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 74.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literatur

  1. Auguste Kerckhoffs (1835–1903), Flemish professor (La cryptographie militaire, 1883).

    Google Scholar 

  2. Marcel Givierge, French general, successful cryptanalyst in the Second World War, author of Cours de Cryptographie, Paris 1925.

    Google Scholar 

  3. Already in 1930, Lieutenant Henno Lucan, Second Signals Officer of the battleship Elsaß, pointed out in a study a weakness of the ENIGMA. With the introduction of the plugboard, the worries seemed to be banished.

    Google Scholar 

  4. Claude E. Shannon, A Mathematical Theory of Cryptography. Internal Report, September 1, 1945. Published in: Communication Theory of Secrecy Systems. Bell System Technical Journal 28, 656–715 (October 1949).

    Google Scholar 

  5. Escrowed Encryption Standard (EES), Federal Information Processing Standards Publication (FIPS PUB) 185, Feb. 9, 1994.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Bauer, F.L. (2000). Encryption Security. In: Decrypted Secrets. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-04024-9_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-04024-9_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-04026-3

  • Online ISBN: 978-3-662-04024-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics