Skip to main content

The Machines Take Over: Computer Cryptography

  • Chapter
  • First Online:
A Brief History of Cryptology and Cryptographic Algorithms

Part of the book series: SpringerBriefs in Computer Science ((BRIEFSCOMPUTER))

  • 2386 Accesses

Abstract

Modern cryptology rests on the shoulders of three men of rare talents. William Friedman, Lester Hill and Claude Shannon moved cryptology from an esoteric, mystical, strictly linguistic realm into the world of mathematics and statistics. Once Friedman, Hill, and Shannon placed cryptology on firm mathematical ground, other mathematicians and computer scientists developed the new algorithms to do digital encryption in the computer age. Despite some controversial flaws, the U.S. Federal Data Encryption Standard (DES) was the most widely used computer encryption algorithm in the 20th century. In 2001 a much stronger algorithm, the Advanced Encryption Standard (AES) that was vetted by a new burgeoning public cryptologic community, replaced it. This chapter introduces Hill and Shannon and explores the details of the DES and the AES.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Anonymous. 1999. Data Encryption Standard (DES) FIPS 46-3, ed. National Institute of Standards and Technology. Gaithersburg, MD: United States Department of Commerce.

    Google Scholar 

  2. Anonymous. 2001. Federal Information Processing Standard 197: Advanced encryption standard (AES), ed. National Institute of Standards and Technology. Gaithersburg, MD: United States Department of Commerce.

    Google Scholar 

  3. Bauer, Craig P. 2013. Secret history: The story of cryptology. Boca Raton, FL: CRC Press.

    Google Scholar 

  4. Daemen, Joan, and Vincent Rijmen. 2002. The design of Rijndael: AES—The advanced encryption standard. New York: Springer.

    Google Scholar 

  5. Diffie, Whitfield, and Martin Hellman. 1977. Exhaustive cryptanalysis of the NBS data encryption standard. IEEE Computer 10(6): 74–84.

    Google Scholar 

  6. Feistel, Horst. 1973. Cryptography and computer privacy. Scientific American 228(5): 15–23.

    Google Scholar 

  7. Hill, Lester S. 1929. Cryptography in an algebraic alphabet. The American Mathematical Monthly 36: 306–312.

    Google Scholar 

  8. Hill, Lester S. 1931. Concerning certain linear transformation apparatus of cryptography. The American Mathematical Monthly 38: 135–154.

    Google Scholar 

  9. Kahn, David. 1967. The codebreakers: The story of secret writing. New York: Macmillan (Hardcover).

    Google Scholar 

  10. Morris, R., N.J.A. Sloane, and A.D. Wyner. 1977. Assessment of the National Bureau of standards proposed federal data encryption standard. Cryptologia 1(3): 281–291.

    Google Scholar 

  11. Shannon, Claude. 1948. A mathematical theory of communication, parts I and II. Bell System Technical Journal 27: 379–423, 623–656.

    Google Scholar 

  12. Shannon, Claude. 1949. Communication Theory of Secrecy Systems. Bell System Technical Journal 28(4): 656–715.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to John F. Dooley .

Rights and permissions

Reprints and permissions

Copyright information

© 2013 The Author(s)

About this chapter

Cite this chapter

Dooley, J.F. (2013). The Machines Take Over: Computer Cryptography. In: A Brief History of Cryptology and Cryptographic Algorithms. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-01628-3_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-01628-3_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-01627-6

  • Online ISBN: 978-3-319-01628-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics