Skip to main content

Short History of Cryptography

Information (religious, military, economic, etc) was always power, this is why the desire to protect it in order to be accessible only to some elites, dates since ancient times. There were discovered ciphertexts older then 4000 years, coming from the Ancient Egypt. There are records that ciphered writings were used since the 5th century BC in Ancient Greece. Thus the Spartan military used a stick (scytalae) around which narrow ribbon lather, papyrus or parchment was rolled, spiral by spiral, on which the clear text was written along the axis. After finishing the writing, the ribbon was unrolled, the message becoming meaningless. Only the person who had an identical stick (playing the role of secret key) with the one used at writing, could have read it.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Adleman, L.M.: Molecular computation of solution to combinatorial problems. Science 266, 1021–1024 (1994)

    Article  Google Scholar 

  2. Ambroze, A., Wade, G., Serdean, C., Tomlinson, M., Stander, Y., Borda, M.: Turbo code protection of video watermark channel. IEE Proceedings Vision Image, Signal Processing 148(1), 54–58 (2001)

    Article  Google Scholar 

  3. Angheloiu, I., Gyorfi, E., Patriciu, V.: Securitatea si protectia informatiei in sistemele electronice de calcul. Editura Militara, Bucuresti (1986)

    Google Scholar 

  4. Arizona Board of Regents and Center for Image Processing in Education, Gel Electrphoresis Notes What is it and how does it work (1999), http://science.exeter.edu

  5. Bajenescu, T., Borda, M.: Securitatea in informatica si telecomunicatii. Editura Dacia (2001)

    Google Scholar 

  6. Bassia, P., Pitas, I.: Robust audio watermarking in the time domain. In: Proc. European Signal Proc. Conf., Rhodes (1998)

    Google Scholar 

  7. Berghel, H., German, L.O.: Protecting Ownership rights through digital watermarking. IEEE Computer 29(7), 101–103 (1996)

    Google Scholar 

  8. Bojcovics, Z.S., Toma, C.I., Gui, V., Vasiu, R.: Advanced topics in digital image compression. Editura Politenhică, Timişoara (1997)

    Google Scholar 

  9. Boneh, D., Dumworth, C., Lipton, R.: Breaking DES using a molecular computer. In: Proceedings of DIMACS workshop on DNA computing (1995)

    Google Scholar 

  10. Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data (963). In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 452–465. Springer, Heidelberg (1995)

    Google Scholar 

  11. Boney, L., Tewfik, A.H., Hamdy, K.H.: Digital watermarks for audio signals. In: Proc. Of 3rd IEEE ICMCS, pp. 473–480 (1996)

    Google Scholar 

  12. Borda, M.: Collaborative research agreement between the University of Plymouth UK and the Technical University of Cluj-Napoca Ro in Video Watemarking, nr. 33, November 11 (1999)

    Google Scholar 

  13. Borda, M.: Digital watermaking basics. Acta Technica Napocensis 42(1), 48–59 (2002)

    Google Scholar 

  14. Borda, M.: Principles of Watermarking. In: Proceedings of Enelko, Cluj-Napoca, pp. 31–40 (2003)

    Google Scholar 

  15. Borda, M., Major, R., Deac, V., Terebes, R.: Raport de faza la contract Contract ANSTI 6113/2001. Tema: Sistem de marcare a imaginilor numerice în scopul autentificării proprietăţii intelectuale asupra acestora (2001)

    Google Scholar 

  16. Borda, M., Major, R., Deac, V., Terebes, T.: Raport de faza la contract Contract ANSTI 6113/2002. Tema: Sistem de marcare a imaginilor numerice în scopul autentificării proprietăţii intelectuale asupra acestora (2002)

    Google Scholar 

  17. Borda, M., Tornea, O.: DNA Secret Writing Techniques. In: Proceedings of 8th Intl. Conf. on Communications, pp. 451–456 (2010)

    Google Scholar 

  18. Borda, M., Tornea, O., Hodorogea, T., Vaida, M.: Encryption system with indexing DNA chromosomes cryptographic. In: Proceedings of IASTED, pp. 12–15 (2010)

    Google Scholar 

  19. Borda, M., Vancea, F., Deac, V.: Raport intern de cercetare. Contract ANSTI 6113/2000. Tema: Sistem de marcare a imaginilor numerice în scopul autentificării proprietăţii intelectuale asupra acestora (2000)

    Google Scholar 

  20. Brasil, J., Low, S., Maxemchuk, N., O´Gorman, L.: Electronic marking and identification techniques to discourage document copying. In: IEEE Infocom 1994, pp. 1278–1287 (1994)

    Google Scholar 

  21. Brasil, J., Low, S., Maxemchuk, N., O´Gorman, L.: Electronic marking and identification techniques to discourage document copying. IEEE, J. Select. Areas Commun. 13, 1495–1504 (1995)

    Article  Google Scholar 

  22. Bultzer, P.L., Jansche, S.: Mellin Transform Theory and The Role of its Differential and Integral operators. In: Proceedings of Second International Workshop On Transform Methods and Special Functions, Varna, pp. 63–83 (1996)

    Google Scholar 

  23. Caroni, J.: Assuring ownership rights for digital images VIS 1995. Session Realiable IT Systems, Veiweg (1995)

    Google Scholar 

  24. Cox, I.J., Kilian, J., Leighten, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. Technical Report 95-10, NEC Research Institute, Princeton, NY, USA (1995)

    Google Scholar 

  25. Cox, I.J., Linnartz, J.: Public watermark and resistance to tampering. In: IEEE Int. Conf. On Image Processing, vol. 3, pp. 3–6 (1997)

    Google Scholar 

  26. Cox, I.J., Linnartz, J.: Some general methods for tampering with watermarks. In: IEEE Int. Conf. On Image Processing, vol. 16(4), pp. 587–593 (1997)

    Google Scholar 

  27. Cox, I.J., Miller, M., Bloom, J.: Digital watermarking. In: Principle and practice. Academic Press, London (2002)

    Google Scholar 

  28. Cox, I.J., Miller, M.L., Mckellips, A.L.: Watermarking as Communications with Side Information. Proceedings of IEEE 87(7), 1127–1141 (1999)

    Article  Google Scholar 

  29. Craver, S., Memon, N., Yeo, B.L., Minerva, M.: Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitation, Attacks, and Implications. IEEE Journal on Selected Areas in Communications 16(4), 573–586 (1998)

    Article  Google Scholar 

  30. Gehani, A., LaBean, T.H., Reif, J.H.: DNA-based cryptography. In: Jonoska, N., Păun, G., Rozenberg, G. (eds.) Aspects of Molecular Computing. LNCS, vol. 2950, pp. 167–188. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  31. Guoan, B.: Fast algorithms for the 2-D discret W transform. Signal Processing 74, 297–308 (1999)

    Article  MATH  Google Scholar 

  32. Hartung, F., Girod, B.: Watermarking of uncompressed and compressed video. Signal Processing 66, 283–301 (1998)

    Article  MATH  Google Scholar 

  33. Hartung, F., Girod, B.: Digital Watermarking of Raw and Compressed Video. Digital Compression Technologies and Systems for Video Communications 2952, 205–213 (1996)

    Google Scholar 

  34. Hartung, F., Girod, B.: Digital Watermarking of MPEG-2 Coded Video in the Bit-stream Domain. In: Proceedings of International Conference on Acoustic, Speech and Signal Processing, vol. 4, pp. 2985–2988 (1997)

    Google Scholar 

  35. Hartung, F., Kutter, M.: Multimedia Watermarking Techniques. Proceedings of IEEE 87(7), 1079–1106 (1999)

    Article  Google Scholar 

  36. Hartung, F., Su, J.K., Girod, B.: Spread Spectrum Watermarking: Malicious Attacks and Counterattacks. In: Proc. Of SPIE Security and Watermarking of Multimedia Contents, vol. 3957, pp. 147–158 (1999)

    Google Scholar 

  37. Hernandez, J.R., Perez-Gonzales, F.: Statistical Analysis of Watermarking Schemes for Copyright Protection of Images. Proceedings of IEEE 87(7), 1142–1166 (1999)

    Article  Google Scholar 

  38. http://www.ncbi.nlm.nih.gov

  39. Jayant, N., Johnston, J., Safranek, R.: Signal Compression Based on Models of Human Perception. Proceedings of IEEE 81(10), 1385–1422 (1993)

    Article  Google Scholar 

  40. Joseph, J.K., Ruanaaidh, O., Pun, T.: Rotation, scale and translation invariant spread spectrum digital image watermarking. Signal Processing 66, 303–317 (1998)

    Article  MATH  Google Scholar 

  41. Kahn, D.: The Codebreakers. McMillan, New York (1967)

    Google Scholar 

  42. Katzenbeisser, S., Petitcolas, F.: Information hiding techniques for steganography and digital watermarking. Artech House, Boston (2000)

    Google Scholar 

  43. Kim, S.W., Suthaharan, S., Lee, H.K., Rao, K.R.: Image watermarking scheme using visual model and BN distribution. Electronics Letters 35(3), 212–214 (1999)

    Article  Google Scholar 

  44. Kingsbury, N.G.: The Dual-Tree Complex Wavelet Transform: A new Tehnique for Shift Invariance and Directional Filters. In: Proc. 8th IEEE DSP Workshop, Bryce Canyon (1998)

    Google Scholar 

  45. Kobayaski, M.: Digital Watermarking: Hystorical roots. IBM Research. Apr. Tokyo Res. Lab. Technical Report (1997)

    Google Scholar 

  46. Langelaar, G.C., Lagendijk, R.L., Biemond, J.: Real time labeling methods for MPEG compressed video. In: Proc. 18th Symp. on Information Theory in the Benelux, Voldhoven, NL (1997)

    Google Scholar 

  47. Langelaar, G.C., Setyawan, I., Lagendijk, R.L.: Watermarking Digital Image and Video Data. Signal Processing Magazine 20-46 (2000)

    Google Scholar 

  48. Low, S., Maxemchuk, N.: Performance comparison of two text marking methods. IEEE J. Selected Areas Commun. 16, 561–571 (1998)

    Article  Google Scholar 

  49. Low, S., Maxemchuk, N., Brasil, J., O´ German, L.: Document marking and identification using both line and word shifting. In: Proc. Infocom 1995, Boston (1995)

    Google Scholar 

  50. Lu, C.S., Huang, S.K., Sze, C.J., Liao, H.Y.M.: A New Watermarking Tehnique for Multimedia Protection. In: Guan, L., Kung, S.Y., Larsen, J. (eds.) Multimedia Image and Video Processing. CRC Press Inc., Boca Raton (1999) (to appear)

    Google Scholar 

  51. Lu, C.S., Liao, H.Y.M., Huang, S.K., Sze, C.J.: Cocktail Watermarking on Images. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 333–347. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  52. Lu, C.-S., Liao, H.-Y.M., Huang, S.-K., Sze, C.-J.: Highly Robust Image Watermarking Using Complementary Modulations. In: Zheng, Y., Mambo, M. (eds.) ISW 1999. LNCS, vol. 1729, pp. 136–153. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  53. Maes, M., Kalker, T., Linnartz, J.P., Talstra, J., Depovere, G.F., Haitsma: Digital water-marking for DVD video copy protection. Signal Processing Magazine 17(5), 47–57 (2000)

    Article  Google Scholar 

  54. Major, R., Borda, M., Amadou, K.: Hash functions for spatial image watermarking. In: International Scientific Conference microCAD, Miskolc, Ungaria, pp. 39–44 (2003)

    Google Scholar 

  55. Maxemchuk, N., Low, S.: Marking text documents. In: Proc. IEEE Int. Conf. Image Processing, Santa Barbara, pp. 13–16 (1997)

    Google Scholar 

  56. Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)

    Book  Google Scholar 

  57. Nafornita, C., Borda, M., Cane, A.: Wavelet-based digital watermarking using subband- adaptative thresholding for still images. In: Proceeding of microCAD, Miskolc, Hungary, pp. 87–91 (2004)

    Google Scholar 

  58. Nikolaidis, N., Pitas, I.: Robust image watermarking in the spatial domain. Signal Processing 66, 385–403 (1998)

    Article  MATH  Google Scholar 

  59. Petitcolas, F.A.P.: Watermarking Schemes Evaluation. Signal Processing Magazine, 58–67 (2000)

    Google Scholar 

  60. Petitcolas, F.A.P., Anderson, R.J., Kulu, M.G.: Information hiding - A survey. Proceedings of the IEEE 87(7), 1062–1078 (1999)

    Article  Google Scholar 

  61. Podlichuk, C.I., Zeng, W.: Image-adaptive watermarking using visual models. IEEE J. Select. Area Commun. 16, 525–539 (1998)

    Article  Google Scholar 

  62. Roweis, S., Winfree, E., Burgoyne, R., et al.: A sticker based architecture for DNA computation. In: DIMACS series in discrete mathematics and theoretical computer science, vol. 44, pp. 1–30 (1996)

    Google Scholar 

  63. Schena, M.: Microarray analyses. Wiley-Liss, Chichester (2003)

    Google Scholar 

  64. Schneier, B.: Applied cryptography: Protocols. In: Algorithms and Source Code in C. John Wiley & Sons, Inc., Chichester (1996)

    Google Scholar 

  65. Shannon, C.: A Mathematical Theory Of Communication. Bell System Technical Journal 27, 379–423 (1948); Reprinted in Shannon Collected Papers, IEEE Press (1993)

    MATH  MathSciNet  Google Scholar 

  66. Shannon, C.: Communication Theory of Secrecy Systems. Bell System Technical Journal 28(4), 656–715 (1949)

    MATH  MathSciNet  Google Scholar 

  67. Smith, M.: Station X: The Codebreakers of Bletchley Park. Channel 4 Books (2000)

    Google Scholar 

  68. Stallings, W.: Cryptography and Network security, Principles and Practice, 2nd edn. Prentice-Hall, Englewood Cliffs (1998)

    Google Scholar 

  69. StirMark, http://www.cl.cam.ac.uk/

  70. Swanson, M.D., Kobayashi, M., Tewfik, A.H.: Multimedia Data Embedding and Watermarking Technologies. Proceedings of the IEEE 86(6), 1064–1087 (1998)

    Article  Google Scholar 

  71. Swanson, M.D., Zhu, B., Chau, B., Tewfik, A.H.: Object-Based Transparent Video Wa-termarking. In: IEEE First Workshop on Multimedia Signal Processing, pp. 369–374 (1997)

    Google Scholar 

  72. Swanson, M.D., Zhu, B., Tewfik, A.H.: Multiresolution scene-based video watermarking using perceptual models. IEEE J. Select. Area Commun. 16(4), 540–550 (1998)

    Article  Google Scholar 

  73. Tanaka, K., Nakamura, Y., Matsui, K.: Embedding secret information into a dithered multilevel image. In: Proc. IEEE Military Commun. Conference, pp. 216–220 (1990)

    Google Scholar 

  74. Taylor, C., Risca, V., Bancroft, C.: Hiding messages in DNA microdots. Nature 399, 533–534 (1999)

    Article  Google Scholar 

  75. Tewfik, A.H.: Digital Watermarking. IEEE Signal Processing Magazine 17(5), 17–18 (2000)

    Article  Google Scholar 

  76. Tewfik, A.H., Hamdy, K.H.: Digital watermarks for audio signals. In: Proc. EUSIPCO 1996, Trieste, Italy (1996)

    Google Scholar 

  77. Tirkel, A., van Schyndel, R., Osborne, C.: A two-dimensional watermark. In: Proc. DICTA, pp. 666–672 (1993)

    Google Scholar 

  78. Tornea, O., Borda, M.: DNA Cryptographic Algorithms. MediTech Cluj-Napoca 26, 223–226 (2009)

    Google Scholar 

  79. U. S. Copyright office Summary, The Digital Millennium Copyright Act of 1998 (December 1998), http://www.loc.gov/copyright/leg

  80. Viterbi, A.J.: CDMA-Principles of spread spectrum communications. Addison –Wesley, London (1996)

    Google Scholar 

  81. Wade, G.: Watermark Attacks. Research Report, Plymouth (1999)

    Google Scholar 

  82. Wang, H.: Prooving theorems by pattern recognition. Bell Systems Technical Journal 40, 1–42 (1961)

    Google Scholar 

  83. Wang, H.J.M., Su, P.C., Kuo, C.-C.J.: Wavelet-based digital image watermarking. Optics Express 3(12), 491–496 (1998)

    Article  Google Scholar 

  84. Watson, A.T.J.: IBM Research Report. RC 20509 Computer science/ Mathematics (1996)

    Google Scholar 

  85. Wolfgang, R.B., Delp, E.J.: Overview of image security techniques with applications in multimedia systems. In: Proc. SPIE Int. Conf. Multimedia Networks: Security, Display, Terminals, and Gateways, vol. 3228(4/5), pp. 297–308 (1997)

    Google Scholar 

  86. Wolfgang, R.B., Podiluck, C.I., Delp, E.J.: Perceptual Watermarks for Digital Images and Video. Proceedings of IEEE 87(7), 1108–1126 (1999)

    Article  Google Scholar 

  87. Wolgang, R.B., Delp, E.J.: Fragile watermarking using the VW2D watermark. Proc. Electronic Imaging 3657, 204–213 (1999)

    Google Scholar 

  88. Xia, X.G., Boncelet, C.G., Arce, G.R.: Wavelet transform based watermark for digital images. Optics Express 3(12), 497–511 (1998)

    Article  Google Scholar 

  89. Borda, M., Tornea, O., Hodorogea, T.: Secrete Writing by DNA Hybridization. Acta. Technica Napocensis 50(2), 21–24 (2009)

    Google Scholar 

  90. Shparlinski, I.: Finite Fields: Theory and Computation. Kluver Academic Publishers, Boston (1999)

    MATH  Google Scholar 

  91. Lidl, R., Niederreiter, H., Cohn, P.M.: Encyclopedia of Mathematics and Its Applications. Cambridge University Press, Cambridge (2000)

    Google Scholar 

  92. Hankerson, D.C., et al.: Coding Theory and Cryptography, 2nd edn. Marcel Dekker, New York (2000)

    MATH  Google Scholar 

  93. Johnson, N.F., Duric, Z., Jajodia, S.: Information Hiding. Kluver Academic Publishers, Boston (2001)

    Google Scholar 

Download references

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Borda, M. (2011). Cryptography Basics. In: Fundamentals in Information Theory and Coding. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20347-3_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-20347-3_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-20346-6

  • Online ISBN: 978-3-642-20347-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics