Short History of Cryptography
Information (religious, military, economic, etc) was always power, this is why the desire to protect it in order to be accessible only to some elites, dates since ancient times. There were discovered ciphertexts older then 4000 years, coming from the Ancient Egypt. There are records that ciphered writings were used since the 5th century BC in Ancient Greece. Thus the Spartan military used a stick (scytalae) around which narrow ribbon lather, papyrus or parchment was rolled, spiral by spiral, on which the clear text was written along the axis. After finishing the writing, the ribbon was unrolled, the message becoming meaningless. Only the person who had an identical stick (playing the role of secret key) with the one used at writing, could have read it.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Adleman, L.M.: Molecular computation of solution to combinatorial problems. Science 266, 1021–1024 (1994)
Ambroze, A., Wade, G., Serdean, C., Tomlinson, M., Stander, Y., Borda, M.: Turbo code protection of video watermark channel. IEE Proceedings Vision Image, Signal Processing 148(1), 54–58 (2001)
Angheloiu, I., Gyorfi, E., Patriciu, V.: Securitatea si protectia informatiei in sistemele electronice de calcul. Editura Militara, Bucuresti (1986)
Arizona Board of Regents and Center for Image Processing in Education, Gel Electrphoresis Notes What is it and how does it work (1999), http://science.exeter.edu
Bajenescu, T., Borda, M.: Securitatea in informatica si telecomunicatii. Editura Dacia (2001)
Bassia, P., Pitas, I.: Robust audio watermarking in the time domain. In: Proc. European Signal Proc. Conf., Rhodes (1998)
Berghel, H., German, L.O.: Protecting Ownership rights through digital watermarking. IEEE Computer 29(7), 101–103 (1996)
Bojcovics, Z.S., Toma, C.I., Gui, V., Vasiu, R.: Advanced topics in digital image compression. Editura Politenhică, Timişoara (1997)
Boneh, D., Dumworth, C., Lipton, R.: Breaking DES using a molecular computer. In: Proceedings of DIMACS workshop on DNA computing (1995)
Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data (963). In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 452–465. Springer, Heidelberg (1995)
Boney, L., Tewfik, A.H., Hamdy, K.H.: Digital watermarks for audio signals. In: Proc. Of 3rd IEEE ICMCS, pp. 473–480 (1996)
Borda, M.: Collaborative research agreement between the University of Plymouth UK and the Technical University of Cluj-Napoca Ro in Video Watemarking, nr. 33, November 11 (1999)
Borda, M.: Digital watermaking basics. Acta Technica Napocensis 42(1), 48–59 (2002)
Borda, M.: Principles of Watermarking. In: Proceedings of Enelko, Cluj-Napoca, pp. 31–40 (2003)
Borda, M., Major, R., Deac, V., Terebes, R.: Raport de faza la contract Contract ANSTI 6113/2001. Tema: Sistem de marcare a imaginilor numerice în scopul autentificării proprietăţii intelectuale asupra acestora (2001)
Borda, M., Major, R., Deac, V., Terebes, T.: Raport de faza la contract Contract ANSTI 6113/2002. Tema: Sistem de marcare a imaginilor numerice în scopul autentificării proprietăţii intelectuale asupra acestora (2002)
Borda, M., Tornea, O.: DNA Secret Writing Techniques. In: Proceedings of 8th Intl. Conf. on Communications, pp. 451–456 (2010)
Borda, M., Tornea, O., Hodorogea, T., Vaida, M.: Encryption system with indexing DNA chromosomes cryptographic. In: Proceedings of IASTED, pp. 12–15 (2010)
Borda, M., Vancea, F., Deac, V.: Raport intern de cercetare. Contract ANSTI 6113/2000. Tema: Sistem de marcare a imaginilor numerice în scopul autentificării proprietăţii intelectuale asupra acestora (2000)
Brasil, J., Low, S., Maxemchuk, N., O´Gorman, L.: Electronic marking and identification techniques to discourage document copying. In: IEEE Infocom 1994, pp. 1278–1287 (1994)
Brasil, J., Low, S., Maxemchuk, N., O´Gorman, L.: Electronic marking and identification techniques to discourage document copying. IEEE, J. Select. Areas Commun. 13, 1495–1504 (1995)
Bultzer, P.L., Jansche, S.: Mellin Transform Theory and The Role of its Differential and Integral operators. In: Proceedings of Second International Workshop On Transform Methods and Special Functions, Varna, pp. 63–83 (1996)
Caroni, J.: Assuring ownership rights for digital images VIS 1995. Session Realiable IT Systems, Veiweg (1995)
Cox, I.J., Kilian, J., Leighten, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. Technical Report 95-10, NEC Research Institute, Princeton, NY, USA (1995)
Cox, I.J., Linnartz, J.: Public watermark and resistance to tampering. In: IEEE Int. Conf. On Image Processing, vol. 3, pp. 3–6 (1997)
Cox, I.J., Linnartz, J.: Some general methods for tampering with watermarks. In: IEEE Int. Conf. On Image Processing, vol. 16(4), pp. 587–593 (1997)
Cox, I.J., Miller, M., Bloom, J.: Digital watermarking. In: Principle and practice. Academic Press, London (2002)
Cox, I.J., Miller, M.L., Mckellips, A.L.: Watermarking as Communications with Side Information. Proceedings of IEEE 87(7), 1127–1141 (1999)
Craver, S., Memon, N., Yeo, B.L., Minerva, M.: Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitation, Attacks, and Implications. IEEE Journal on Selected Areas in Communications 16(4), 573–586 (1998)
Gehani, A., LaBean, T.H., Reif, J.H.: DNA-based cryptography. In: Jonoska, N., Păun, G., Rozenberg, G. (eds.) Aspects of Molecular Computing. LNCS, vol. 2950, pp. 167–188. Springer, Heidelberg (2003)
Guoan, B.: Fast algorithms for the 2-D discret W transform. Signal Processing 74, 297–308 (1999)
Hartung, F., Girod, B.: Watermarking of uncompressed and compressed video. Signal Processing 66, 283–301 (1998)
Hartung, F., Girod, B.: Digital Watermarking of Raw and Compressed Video. Digital Compression Technologies and Systems for Video Communications 2952, 205–213 (1996)
Hartung, F., Girod, B.: Digital Watermarking of MPEG-2 Coded Video in the Bit-stream Domain. In: Proceedings of International Conference on Acoustic, Speech and Signal Processing, vol. 4, pp. 2985–2988 (1997)
Hartung, F., Kutter, M.: Multimedia Watermarking Techniques. Proceedings of IEEE 87(7), 1079–1106 (1999)
Hartung, F., Su, J.K., Girod, B.: Spread Spectrum Watermarking: Malicious Attacks and Counterattacks. In: Proc. Of SPIE Security and Watermarking of Multimedia Contents, vol. 3957, pp. 147–158 (1999)
Hernandez, J.R., Perez-Gonzales, F.: Statistical Analysis of Watermarking Schemes for Copyright Protection of Images. Proceedings of IEEE 87(7), 1142–1166 (1999)
Jayant, N., Johnston, J., Safranek, R.: Signal Compression Based on Models of Human Perception. Proceedings of IEEE 81(10), 1385–1422 (1993)
Joseph, J.K., Ruanaaidh, O., Pun, T.: Rotation, scale and translation invariant spread spectrum digital image watermarking. Signal Processing 66, 303–317 (1998)
Kahn, D.: The Codebreakers. McMillan, New York (1967)
Katzenbeisser, S., Petitcolas, F.: Information hiding techniques for steganography and digital watermarking. Artech House, Boston (2000)
Kim, S.W., Suthaharan, S., Lee, H.K., Rao, K.R.: Image watermarking scheme using visual model and BN distribution. Electronics Letters 35(3), 212–214 (1999)
Kingsbury, N.G.: The Dual-Tree Complex Wavelet Transform: A new Tehnique for Shift Invariance and Directional Filters. In: Proc. 8th IEEE DSP Workshop, Bryce Canyon (1998)
Kobayaski, M.: Digital Watermarking: Hystorical roots. IBM Research. Apr. Tokyo Res. Lab. Technical Report (1997)
Langelaar, G.C., Lagendijk, R.L., Biemond, J.: Real time labeling methods for MPEG compressed video. In: Proc. 18th Symp. on Information Theory in the Benelux, Voldhoven, NL (1997)
Langelaar, G.C., Setyawan, I., Lagendijk, R.L.: Watermarking Digital Image and Video Data. Signal Processing Magazine 20-46 (2000)
Low, S., Maxemchuk, N.: Performance comparison of two text marking methods. IEEE J. Selected Areas Commun. 16, 561–571 (1998)
Low, S., Maxemchuk, N., Brasil, J., O´ German, L.: Document marking and identification using both line and word shifting. In: Proc. Infocom 1995, Boston (1995)
Lu, C.S., Huang, S.K., Sze, C.J., Liao, H.Y.M.: A New Watermarking Tehnique for Multimedia Protection. In: Guan, L., Kung, S.Y., Larsen, J. (eds.) Multimedia Image and Video Processing. CRC Press Inc., Boca Raton (1999) (to appear)
Lu, C.S., Liao, H.Y.M., Huang, S.K., Sze, C.J.: Cocktail Watermarking on Images. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 333–347. Springer, Heidelberg (2000)
Lu, C.-S., Liao, H.-Y.M., Huang, S.-K., Sze, C.-J.: Highly Robust Image Watermarking Using Complementary Modulations. In: Zheng, Y., Mambo, M. (eds.) ISW 1999. LNCS, vol. 1729, pp. 136–153. Springer, Heidelberg (1999)
Maes, M., Kalker, T., Linnartz, J.P., Talstra, J., Depovere, G.F., Haitsma: Digital water-marking for DVD video copy protection. Signal Processing Magazine 17(5), 47–57 (2000)
Major, R., Borda, M., Amadou, K.: Hash functions for spatial image watermarking. In: International Scientific Conference microCAD, Miskolc, Ungaria, pp. 39–44 (2003)
Maxemchuk, N., Low, S.: Marking text documents. In: Proc. IEEE Int. Conf. Image Processing, Santa Barbara, pp. 13–16 (1997)
Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
Nafornita, C., Borda, M., Cane, A.: Wavelet-based digital watermarking using subband- adaptative thresholding for still images. In: Proceeding of microCAD, Miskolc, Hungary, pp. 87–91 (2004)
Nikolaidis, N., Pitas, I.: Robust image watermarking in the spatial domain. Signal Processing 66, 385–403 (1998)
Petitcolas, F.A.P.: Watermarking Schemes Evaluation. Signal Processing Magazine, 58–67 (2000)
Petitcolas, F.A.P., Anderson, R.J., Kulu, M.G.: Information hiding - A survey. Proceedings of the IEEE 87(7), 1062–1078 (1999)
Podlichuk, C.I., Zeng, W.: Image-adaptive watermarking using visual models. IEEE J. Select. Area Commun. 16, 525–539 (1998)
Roweis, S., Winfree, E., Burgoyne, R., et al.: A sticker based architecture for DNA computation. In: DIMACS series in discrete mathematics and theoretical computer science, vol. 44, pp. 1–30 (1996)
Schena, M.: Microarray analyses. Wiley-Liss, Chichester (2003)
Schneier, B.: Applied cryptography: Protocols. In: Algorithms and Source Code in C. John Wiley & Sons, Inc., Chichester (1996)
Shannon, C.: A Mathematical Theory Of Communication. Bell System Technical Journal 27, 379–423 (1948); Reprinted in Shannon Collected Papers, IEEE Press (1993)
Shannon, C.: Communication Theory of Secrecy Systems. Bell System Technical Journal 28(4), 656–715 (1949)
Smith, M.: Station X: The Codebreakers of Bletchley Park. Channel 4 Books (2000)
Stallings, W.: Cryptography and Network security, Principles and Practice, 2nd edn. Prentice-Hall, Englewood Cliffs (1998)
StirMark, http://www.cl.cam.ac.uk/
Swanson, M.D., Kobayashi, M., Tewfik, A.H.: Multimedia Data Embedding and Watermarking Technologies. Proceedings of the IEEE 86(6), 1064–1087 (1998)
Swanson, M.D., Zhu, B., Chau, B., Tewfik, A.H.: Object-Based Transparent Video Wa-termarking. In: IEEE First Workshop on Multimedia Signal Processing, pp. 369–374 (1997)
Swanson, M.D., Zhu, B., Tewfik, A.H.: Multiresolution scene-based video watermarking using perceptual models. IEEE J. Select. Area Commun. 16(4), 540–550 (1998)
Tanaka, K., Nakamura, Y., Matsui, K.: Embedding secret information into a dithered multilevel image. In: Proc. IEEE Military Commun. Conference, pp. 216–220 (1990)
Taylor, C., Risca, V., Bancroft, C.: Hiding messages in DNA microdots. Nature 399, 533–534 (1999)
Tewfik, A.H.: Digital Watermarking. IEEE Signal Processing Magazine 17(5), 17–18 (2000)
Tewfik, A.H., Hamdy, K.H.: Digital watermarks for audio signals. In: Proc. EUSIPCO 1996, Trieste, Italy (1996)
Tirkel, A., van Schyndel, R., Osborne, C.: A two-dimensional watermark. In: Proc. DICTA, pp. 666–672 (1993)
Tornea, O., Borda, M.: DNA Cryptographic Algorithms. MediTech Cluj-Napoca 26, 223–226 (2009)
U. S. Copyright office Summary, The Digital Millennium Copyright Act of 1998 (December 1998), http://www.loc.gov/copyright/leg
Viterbi, A.J.: CDMA-Principles of spread spectrum communications. Addison –Wesley, London (1996)
Wade, G.: Watermark Attacks. Research Report, Plymouth (1999)
Wang, H.: Prooving theorems by pattern recognition. Bell Systems Technical Journal 40, 1–42 (1961)
Wang, H.J.M., Su, P.C., Kuo, C.-C.J.: Wavelet-based digital image watermarking. Optics Express 3(12), 491–496 (1998)
Watson, A.T.J.: IBM Research Report. RC 20509 Computer science/ Mathematics (1996)
Wolfgang, R.B., Delp, E.J.: Overview of image security techniques with applications in multimedia systems. In: Proc. SPIE Int. Conf. Multimedia Networks: Security, Display, Terminals, and Gateways, vol. 3228(4/5), pp. 297–308 (1997)
Wolfgang, R.B., Podiluck, C.I., Delp, E.J.: Perceptual Watermarks for Digital Images and Video. Proceedings of IEEE 87(7), 1108–1126 (1999)
Wolgang, R.B., Delp, E.J.: Fragile watermarking using the VW2D watermark. Proc. Electronic Imaging 3657, 204–213 (1999)
Xia, X.G., Boncelet, C.G., Arce, G.R.: Wavelet transform based watermark for digital images. Optics Express 3(12), 497–511 (1998)
Borda, M., Tornea, O., Hodorogea, T.: Secrete Writing by DNA Hybridization. Acta. Technica Napocensis 50(2), 21–24 (2009)
Shparlinski, I.: Finite Fields: Theory and Computation. Kluver Academic Publishers, Boston (1999)
Lidl, R., Niederreiter, H., Cohn, P.M.: Encyclopedia of Mathematics and Its Applications. Cambridge University Press, Cambridge (2000)
Hankerson, D.C., et al.: Coding Theory and Cryptography, 2nd edn. Marcel Dekker, New York (2000)
Johnson, N.F., Duric, Z., Jajodia, S.: Information Hiding. Kluver Academic Publishers, Boston (2001)
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Borda, M. (2011). Cryptography Basics. In: Fundamentals in Information Theory and Coding. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20347-3_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-20347-3_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-20346-6
Online ISBN: 978-3-642-20347-3
eBook Packages: EngineeringEngineering (R0)