Abstract
Passwords serve to select a method from a class of methods, and keys especially to select encryption steps from an encryption system. It is wise to assume pessimistically that the enemy knows what method has been chosen—there are not too many of them, and most cryptographers are familiar with only a few. The ‘basic law of cryptology’, which Kerckhoffs1 had formulated as “il faut qu’il puisse sans inconvénient tomber entre les mains de l’ennemi” was expressed more succinctly by Shannon in 1949: “the enemy knows the system being used.” It follows that one must be particularly careful in the choice of a key. It is a serious mistake to use obvious words. Porta gave the express warning: “the further removed the key words are from common knowledge, the greater the security they provide.” The use of keys had hardly become common practice before unauthorized persons succeeded in decrypting messages by guessing the key word.
Even in cryptology, silence is golden.
Laurence D. Smith
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Literatur
Auguste Kerckhoffs (1835–1903), Flemish professor (La cryptographie militaire, 1883).
Marcel Givierge, French general, successful cryptanalyst in the Second World War, author of Cours de Cryptographie, Paris 1925.
Already in 1930, Lieutenant Henno Lucan, Second Signals Officer of the battleship Elsaß, pointed out in a study a weakness of the ENIGMA. With the introduction of the plugboard, the worries seemed to be banished.
Claude E. Shannon, A Mathematical Theory of Cryptography. Internal Report, September 1, 1945. Published in: Communication Theory of Secrecy Systems. Bell System Technical Journal 28, 656–715 (October 1949).
Escrowed Encryption Standard (EES), Federal Information Processing Standards Publication (FIPS PUB) 185, Feb. 9, 1994.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Bauer, F.L. (2000). Encryption Security. In: Decrypted Secrets. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-04024-9_11
Download citation
DOI: https://doi.org/10.1007/978-3-662-04024-9_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-04026-3
Online ISBN: 978-3-662-04024-9
eBook Packages: Springer Book Archive