Skip to main content

Evolution of Applied Cryptography

  • Chapter
  • First Online:
Ransomware Revolution: The Rise of a Prodigious Cyber Threat

Part of the book series: Advances in Information Security ((ADIS,volume 85))

Abstract

This chapter briefly explains the evolution of applied cryptography by reflecting on its origins and its ongoing evolution. The objective of this chapter is to provide a basic insight into how applied cryptography has evolved whilst acknowledging the contributions of the inventors and security researchers that have further advanced the discipline. Indeed, applied cryptography and encryption are not the sum of one inventor or invention, they are the product of thousands of years of applied research. The final sections of the chapter explore the growing public demand for encryption and the paradox encryption creates for ransomware victims.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Note: Social media stories such as Wikileaks and Edward Snowden’s may have also played a significant role in the broader public’s use and perception of advanced encryption techniques. The use of encryption can also be commonly associated with dissidents and citizens under repressive regimes and those involved in forms of illegal activities such as drug trafficking and terrorism.

  2. 2.

    Note: Current generation decryption applications apply extensive data analytics, using the most commonly used passwords first. Statistically, this could drastically reduce the time required to discover the key in comparison to conventional accumulation-type brute-force attacks.

  3. 3.

    Note: This is the absolute theoretical maximum time frame it would take to discover all possible keys.

  4. 4.

    Note: A rainbow table is a precomputed (calculated) table for reversing cryptographic hash functions.

  5. 5.

    Note. NotPetya is a clear example of ransomware that was designed to be destructive.

References

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Ryan, M. (2021). Evolution of Applied Cryptography. In: Ransomware Revolution: The Rise of a Prodigious Cyber Threat. Advances in Information Security, vol 85. Springer, Cham. https://doi.org/10.1007/978-3-030-66583-8_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-66583-8_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-66582-1

  • Online ISBN: 978-3-030-66583-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics