Abstract
This chapter briefly explains the evolution of applied cryptography by reflecting on its origins and its ongoing evolution. The objective of this chapter is to provide a basic insight into how applied cryptography has evolved whilst acknowledging the contributions of the inventors and security researchers that have further advanced the discipline. Indeed, applied cryptography and encryption are not the sum of one inventor or invention, they are the product of thousands of years of applied research. The final sections of the chapter explore the growing public demand for encryption and the paradox encryption creates for ransomware victims.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Note: Social media stories such as Wikileaks and Edward Snowden’s may have also played a significant role in the broader public’s use and perception of advanced encryption techniques. The use of encryption can also be commonly associated with dissidents and citizens under repressive regimes and those involved in forms of illegal activities such as drug trafficking and terrorism.
- 2.
Note: Current generation decryption applications apply extensive data analytics, using the most commonly used passwords first. Statistically, this could drastically reduce the time required to discover the key in comparison to conventional accumulation-type brute-force attacks.
- 3.
Note: This is the absolute theoretical maximum time frame it would take to discover all possible keys.
- 4.
Note: A rainbow table is a precomputed (calculated) table for reversing cryptographic hash functions.
- 5.
Note. NotPetya is a clear example of ransomware that was designed to be destructive.
References
M. Arora, How secure is AES against brute force attacks? EE Times. (2012) [Online]. Available online: https://www.eetimes.com/document.asp?doc_id=1279619#. Accessed 10 Mar 2018
J. Daemen, V. Rijmen, The Design of Rijndael: AES – The Advanced Encryption Standard (Springer, Berlin, 1998)
W. Diffie, M. Hellman, New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644 (1976)
S. Fluhrer, Mantin I., Shamir A., Weaknesses in the key scheduling algorithm of RC4, Paper presented at the International Workshop on Selected Areas in Cryptography. 2011
L.J. Freeh, Director of the Federal of Investigations. (9 Sept 1997) [Presentation]
A. Greenberg, How to encrypt all of the things, WIRED. (2017). Available online: https://www.wired.com/story/encrypt-all-of-the-things/. Accessed 26 Apr 2019
D. Kahn, The Codebreakers: The Story of Secret Writing (MacMillan, New York, 1967)
A. Kerckhoffs, La cryptographie militaire. J. Sci. Milit. IX, 5–38 (1883)
A. Kharraz, W. Robertson, D. Balzarotti, L. Bilge, E. Kirda, Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks (Springer International Publishing, Cham, 2015)
S. Landau, Polynomials in the Nation’s service: Using algebra to design the advanced encryption standard. Am. Math. Mon. 111(2), 89–117 (2004)
L. Lessig, Code and Other Laws of Cyberspace (Basic Books, New York, 1999)
G.E. Moore, Tech Digest. IEDM 21, 11–13 (1975)
National Institute of Standards and Technology, Cryptographic standards and guidelines. (2001). Available online: https://csrc.nist.gov/Projects/Cryptographic-Standards-and-Guidelines/Archived-Crypto-Projects/AES-Development. Accessed 26 Apr 2018
National Security Agency, National Policy on the Use of the Advanced Encryption Standard (AES) to Protect National Security Systems and National Security Information, in Committee on National Security Systems, (National Security Agency, Washington D.C., 2003)
K. Raju, Can cloud storage save you from ransomware attacks?, Info Security Magazine, 17 July 2017 (2017)
R. Rivest, A. Shamir, L. Adleman, U.S. Patent 4,405,829. Issued September 20, 1983. Available here, Cryptographic Communications system and method (United States Patent 1977). Available online: https://patents.google.com/patent/US4405829A/en. Accessed 22 Jan 2020
B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C (Wiley, New York, 1996)
B. Schneier, A ‘Key’ for encryption, even for good reasons, weakens security, The New York Times. 15 July 2016, (2016) [Online]. Available online: https://www.nytimes.com/roomfordebate/2016/02/23/has-encryption-gone-too-far/a-key-for-encryption-even-for-good-reasons-weakens-security. Accessed 26 Apr 2019
D. Thakkar, Preventing Digital Extortion (Packt Publishing, Birmingham, 2017)
F. Winterbotham, The Ultra Secret (Weidenfeld & Nicolson, London, 1975)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Ryan, M. (2021). Evolution of Applied Cryptography. In: Ransomware Revolution: The Rise of a Prodigious Cyber Threat. Advances in Information Security, vol 85. Springer, Cham. https://doi.org/10.1007/978-3-030-66583-8_3
Download citation
DOI: https://doi.org/10.1007/978-3-030-66583-8_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-66582-1
Online ISBN: 978-3-030-66583-8
eBook Packages: Computer ScienceComputer Science (R0)