Abstract
Modern cryptology rests on the shoulders of three men of rare talents. William Friedman, Lester Hill and Claude Shannon moved cryptology from an esoteric, mystical, strictly linguistic realm into the world of mathematics and statistics. Once Friedman, Hill, and Shannon placed cryptology on firm mathematical ground, other mathematicians and computer scientists developed the new algorithms to do digital encryption in the computer age. Despite some controversial flaws, the U.S. Federal Data Encryption Standard (DES) was the most widely used computer encryption algorithm in the 20th century. In 2001 a much stronger algorithm, the Advanced Encryption Standard (AES) that was vetted by a new burgeoning public cryptologic community, replaced it. This chapter introduces Hill and Shannon and explores the details of the DES and the AES.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Anonymous. 1999. Data Encryption Standard (DES) FIPS 46-3, ed. National Institute of Standards and Technology. Gaithersburg, MD: United States Department of Commerce.
Anonymous. 2001. Federal Information Processing Standard 197: Advanced encryption standard (AES), ed. National Institute of Standards and Technology. Gaithersburg, MD: United States Department of Commerce.
Bauer, Craig P. 2013. Secret history: The story of cryptology. Boca Raton, FL: CRC Press.
Daemen, Joan, and Vincent Rijmen. 2002. The design of Rijndael: AES—The advanced encryption standard. New York: Springer.
Diffie, Whitfield, and Martin Hellman. 1977. Exhaustive cryptanalysis of the NBS data encryption standard. IEEE Computer 10(6): 74–84.
Feistel, Horst. 1973. Cryptography and computer privacy. Scientific American 228(5): 15–23.
Hill, Lester S. 1929. Cryptography in an algebraic alphabet. The American Mathematical Monthly 36: 306–312.
Hill, Lester S. 1931. Concerning certain linear transformation apparatus of cryptography. The American Mathematical Monthly 38: 135–154.
Kahn, David. 1967. The codebreakers: The story of secret writing. New York: Macmillan (Hardcover).
Morris, R., N.J.A. Sloane, and A.D. Wyner. 1977. Assessment of the National Bureau of standards proposed federal data encryption standard. Cryptologia 1(3): 281–291.
Shannon, Claude. 1948. A mathematical theory of communication, parts I and II. Bell System Technical Journal 27: 379–423, 623–656.
Shannon, Claude. 1949. Communication Theory of Secrecy Systems. Bell System Technical Journal 28(4): 656–715.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2013 The Author(s)
About this chapter
Cite this chapter
Dooley, J.F. (2013). The Machines Take Over: Computer Cryptography. In: A Brief History of Cryptology and Cryptographic Algorithms. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-01628-3_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-01628-3_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-01627-6
Online ISBN: 978-3-319-01628-3
eBook Packages: Computer ScienceComputer Science (R0)