Abstract
A survey of the known cryptographic methods is given in this chapter from the point of view of securing1 established channels of communication against (passive) eavesdropping and (active) falsification (ISO 7498). Security against breaking the secrecy in the sense of confidentiality and privacy is the classic goal, whereas security against forgery and spurious messages, that is to say authentication of the sender, has only recently acquired much importance.
Nearly every inventor of a cipher system has been convinced of the unsolvability of his brainchild.
David Kahn.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Since the discoveries of Shannon and Hamming in about 1950, mere garbling and corruption of communication channels by physical or technical means has been countered by error-detecting and error-correcting codes, which need not be considered here.
Johannes Friedrich, Extinct Languages, New York 1957.
Born Wolfe Friedmann in Kishinev (Moldavia) on Sep. 24, 1891. The family emigrated to the U.S.A. the following year. He died on Nov. 2, 1969 and was buried in Arlington.
Cypher is an older form of cipher, still current in Great Britain.
In contrast to cleartext, which means a text transmitted without encryption.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Bauer, F.L. (2000). Aims and Methods of Cryptography. In: Decrypted Secrets. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-04024-9_2
Download citation
DOI: https://doi.org/10.1007/978-3-662-04024-9_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-04026-3
Online ISBN: 978-3-662-04024-9
eBook Packages: Springer Book Archive