Abstract
In this chapter, the conventional cryptography fundamentals are introduced. The chapter starts with basic terminology and cryptographic schemes, including symmetric and asymmetric cryptography, basic ciphers such as substitution and transposition ciphers , and one-time pads . The concepts of secrecy , authentication , and non-repudiation are introduced then, followed by various cryptanalytic attacks such as ciphertext-only, known-plaintext, chosen-plaintext , chosen-ciphertext , and adaptive-chosen-plaintext attacks . In section on information-theoretic approach to cryptography , the concept of perfect security is introduced and compared against the computational security . In the same section, unicity distance is discussed as well as the role of compression in cryptography. After that, one-way functions and one-way hash functions are discussed. The chapter concludes with several relevant practical cryptographic systems including DES and RSA systems as well as Diffie–Hellman public-key distribution .
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:656–715
Schneier B (2015) Applied cryptography, second edition: protocols, algorithms, and source code in C. Wiley, Indianapolis, IN
Drajic D, Ivanis P (2009) Introduction to information theory and coding, 3rd edn. Akademska Misao, Belgrade, Serbia (in Serbian)
Haykin S (2001) Communication systems, 4th edn. Wiley, Hamilton Printing Company, Canada
Katz J, Lindell Y (2015) Introduction to modern cryptography, 2nd edn. CRC Press, Boca Raton, FL
Diffie W, Hellman ME (1976) New direction in cryptography. IEEE Trans Inform Theory IT 22:644–654
Hellman ME (1977) An extension of the Shannon theory approach to cryptography. IEEE Trans Inform Theory IT 23:289–294
Rivest RL, Shamir A, Adleman L (1983) Cryptographic communications system and method. US Patent 4,405,829
Merkle M (1978) Secure communication over an insecure channel. Comm ACM 21:294–299
McEliece RJ (1978) A public key cryptosystem based on algebraic coding theory. JPL DSN Prog Rep 42(44):114–116
Aumasson J-P (2018) Serious cryptography: a practical introduction to modern encryption. No Starch Press, San Francisco, CA
Kahn D (1967) The codebreakers: the story of secret writing. Macmillan Publishing Co., New York
Neilsen MA, Chuang IL (2010) Quantum computation and quantum information. Cambridge University Press, Cambridge
Van Assche G (2006) Quantum cryptography and secrete-key distillation. Cambridge University Press, Cambridge, New York
Djordjevic IB (2012) Quantum information processing and quantum error correction: an engineering approach. Elsevier/Academic Press, Amsterdam, Boston
Djordjevic IB (2017) Advanced optical and wireless communications systems. Springer International Publishing, Switzerland
Sebbery J, Pieprzyk J (1989) Cryptography: an introduction to computer security. Prentice Hall, New York
Delfs H, Knebl H (2015) Introduction to cryptography: principles and applications (Information Security and Cryptography), 3rd edn. Springer, Heidelberg, New York
Merckle RC (1979) Secrecy, authentication, and public key systems. PhD dissertation. Stanford University
Merckle RC (1990) One way hash functions and DES. In: Proceedings of Advances in Cryptology-CRYTPO ’89. Springer, pp 428–446
Rivest RL (1991) The MD4 message digest algorithm. In: Proceedings of Advances in Cryptology-CRYTPO ’90. Springer, pp 303–311
Rivest RL (1992) The MD5 message digest algorithm. RFC 1321. https://tools.ietf.org/html/rfc1321
National Institute of Standards and Technology, NIST FIPS PUB 186. Digital Signature Standard. US Department of Commerce (May 1994)
Diffie W, Hellman ME (1979) Privacy and authentication: an introduction to cryptography. Proc IEEE 67(3):397–427
ANSI X3.92, American National Standard for Data Encryption Algorithm (DEA). American National Standards Institute (1981)
Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Comm ACM 21(2):120–126
Feistel H (1973) Cryptography and computer privacy. Sci Am 228(5):15–23
Feistel H (1974) Block cipher cryptographic system. US Patent 3,798,359
Luby M, Rackoff C (1988) How to construct pseudorandom permutations from pseudorandom functions. SIAM J Comput 17(2):373–386
National Bureau of Standards (1980) NBS FIPS PUB 81. DES modes of operation. US Department of Commerce
Menezes AJ, van Oorschot PC, Vanstone SA (1997) Handbook of applied cryptography. CRC Press, Boca Raton
Electronic Frontier Foundation (1998) Cracking DES—Secrets of Encryption Research. Wiretap Politics & Chip Design. Oreilly & Associates Inc. ISBN 1-56592-520-3
Andrews GE (1994) Number theory. Dover Publications, New York
Le Bellac M (2006) A short introduction to quantum information and quantum computation. Cambridge University Press, Cambridge, New York
Hellman ME (2002) An overview of public key cryptography. IEEE Commun Mag 40(5): 42–49
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Djordjevic, I.B. (2019). Conventional Cryptography Fundamentals. In: Physical-Layer Security and Quantum Key Distribution . Springer, Cham. https://doi.org/10.1007/978-3-030-27565-5_3
Download citation
DOI: https://doi.org/10.1007/978-3-030-27565-5_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-27564-8
Online ISBN: 978-3-030-27565-5
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)