Synonyms
Glossary
The definitions below follow the glossary in RFC 4949 (IETF 2007b) unless marked with (*):
- Algorithm:
-
A finite set of step-by-step instructions for a problem-solving or computation procedure, especially one that can be implemented by a computer.
- Cipher text or ciphertext:
-
Data that has been transformed by encryption so that its semantic information content (i.e., its meaning) is no longer intelligible or directly available.
- Cipher:
-
A cryptographic algorithm for encryption and decryption.
- Code:
-
An encryption algorithm based on substitution, i.e., a system for providing data confidentiality by using arbitrary groups (called “code groups”) of letters, numbers, or symbols to represent units of plaintext of varying length (i.e., code words cause substitutions of important terms such as Mr. President with Ms. Bloomfield).
- Cryptanalysis:
-
The mathematical science that deals with analysis of a cryptographic system to gain knowledge needed to break or circumvent the...
This is a preview of subscription content, log in via an institution.
References
Bernstein DJ, Buchmann J, Dahmen E (2009) Post-quantum cryptography. Springer, Berlin Heildelberg
Castells M (2009) The rise of the network society: the information age: economy, society, and culture, vol I, 2nd edn. Wiley-Blackwell, Oxford UK
Clark D, Reed D, Saltzer J (1984) End-to-end arguments in system design. ACM Trans Comput Syst 2(4):277–288
Cohen J (2012) What privacy is for. Harv Law Rev 126(1904):1920–1921
Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644–654
Dingledine R, Mathewson N, Syverson P (2004) Tor: the second-generation onion router. In: Proceedings of the 13th usenix security symposium, Washington DC
Dooley JF (2013) A brief history of cryptology and cryptographic algorithms (SpringerBriefs in computer science). Springer, Heidelberg New York Dordrecht London
Etzioni A (2016) Apple: good business, poor citizen? J Bus Ethics:1–11
EU-Article 29 Working Party (2013) Advice paper on essential elements of a definition and a provision on profiling within the EU General Data Protection Regulation. Art 29 Data Protection Working Party. http://ec.europa.eu/justice/data-protection/article-29/documentation/other-document/files/2013/20130513_advice-paper-on-profiling_en.pdf. Last Accessed Aug 2016
FBI - Federal Bureau of Investigation (2016) Shooter order compelling. https://assets.documentcloud.org/documents/2714005/SB-Shooter-Order-Compelling-Apple-Asst-iPhone.pdf. Last Accessed Aug 2016
Froomkin AM (1995) The metaphor is the key: cryptography, the clipper chip and the constitution. 143 U Penn L rev 709
Froomkin AM (1996) It came from planet clipper: the battle over cryptographic key ‘escrow’. U chi L forum 15 (the law of Cyberspace symposium volume)
IETF (1974) Request for comments 675. Specificationf of Internet transmission control program. https://tools.ietf.org/html/rfc675. Last Accessed Aug 2016
IETF (1991) Request for Comments 1180. A TCP/IP tutorial. https://tools.ietf.org/html/rfc1180. Last Accessed Aug 2016
IETF (1996a) Request for comments 1958. Architectural principles of the Internet. https://tools.ietf.org/html/rfc1958. Last Accessed Aug 2016
IETF (1996b) Request for comments 2026. The Internet standards process – revision 3. https://tools.ietf.org/html/rfc2026. Last Accessed Aug 2016
IETF (1998) Request for Comments 2440. OpenPGP Message Format. https://tools.ietf.org/html/rfc2440. Last Accessed Aug 2016
IETF (2001) Request for comments 3160. The Tao of IETF – a novice’s guide to the Internet engineering task force. https://tools.ietf.org/html/rfc3160. Last Accessed Aug 2016
IETF (2007a) Request for Comments 4880. OpenPGP message format. https://tools.ietf.org/html/rfc4880. Last Accessed Aug 2016
IETF (2007b) Request for comments 4949. Internet security glossary, version 2. https://tools.ietf.org/html/rfc4949 . Last accessed Aug 2016
IETF (2011) Request for comments 6071. IP security (IPsec) and Internet Key Exchange (IKE) Document Roadmap. https://tools.ietf.org/html/rfc6071. Last Accessed Aug 2016
IETF (2014) Request for comments 7258. Pervasive monitoring is an attack. https://tools.ietf.org/html/rfc7258. Last Accessed Aug 2016
ITU - International Telecommunication Union (2016) Recommendation X.509. http://www.itu.int/rec/T-REC-X.509/en. Last Accessed Aug 2016
Kahn D (1996) The Codebreakers: the comprehensive history of secret communication from ancient times to the Internet. Scribner, New York
Kerckhoffs A (1883) La cryptographie militaire (military cryptography). Journal des Sciences Militaires, Vol. IX, pp 161–191
Lessig L (2006) Code v2.0, code and other Laws of cyberspace. basic books New York. Creative commons. http://codev2.cc/. Last Accessed Aug 2016
Nissenbaum H (2004) Privacy as contextual integrity. Wash Law Rev 79(1):101–139
Nissenbaum H (2009) Privacy in context: technology, policy, and the integrity of social life. Stanford University Press, Stanford, California
NIST – National Institute of Standards and Technology (2001) Federal information processing standards publication announcing the advanced encryption standard (AES). http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf. Last Accessed Aug 2016
Paar C, Pelzi J, Preneel B (2010) Understanding cryptography: a textbook for students and practitioners. Springer, Heidelberg Dordrecht London New York
Privacy and Civil Liberties Oversight Board (2014a) Report on the surveillance program operated pursuant to section 702 of the Foreign intelligence surveillance act. https://www.pclob.gov/library/702-Report.pdf. Last Accessed Aug 2016
Privacy and Civil Liberties Oversight Board (2014b) Report on the telephone records program conducted under section 215 of the USA PATRIOT act and on the operations of the Foreign intelligence surveillance court. https://www.pclob.gov/library/215-Report_on_the_Telephone_Records_Program.pdf. Last Accessed Aug 2016
Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126
Schneier B (2014) It’s time to break up the NSA. http://edition.cnn.com/2014/02/20/opinion/schneier-nsa-too-big/index.html. Last Accessed Aug 2016
Schneier B (2015) Data and goliath. The hidden battles to collect your data and control your World. W. W Norton & Company, New York
Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27:379, 423, 623, 656
Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715
Shor P (1997) Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J Comput 26:1484–1509
Singh S (2000) The code book: the science of secrecy from ancient Egypt to quantum cryptography. Anchor Books, New York
Solove DJ (2008) Data mining and the security-liberty debate. Univ Chicago Law, New Haven & London Rev 74:343
Solove DJ (2011) Nothing to hide: the false tradeoff between privacy and security. Yale University Press
Stallman R (2016) Why open source misses the point of free software. https://www.gnu.org/philosophy/open-source-misses-the-point.html. Last Accessed Aug 2016
Tannenbaum AS, Wetherall DJ (2011) Computer networks. Pearson, Boston
The Guardian (2016) The NSA files. https://www.theguardian.com/us-news/the-nsa-files. Last Accessed Aug 2016
The Washington Post (2016) How the NSA is tracking people right now. https://www.washingtonpost.com/apps/g/page/world/how-the-nsa-is-tracking-people-right-now/634/. Last Accessed Aug 2016
United Nations (2013) Resolution adopted by the general assembly on 18 December 2013. http://www.un.org/en/ga/search/view_doc.asp?symbol=A/RES/68/167. Last Accessed Aug 2016
Valls-Prieto J (2014) Chapter 10: Fighting cybercrime and protecting privacy: DDoS, spy software, and online attacks. In: Handbook of research on digital crime, cyberspace security, and information assurance. IGI Global, Hershey, Pennsylvania
Warren SD, Brandeis LD (1890) The right to privacy. Harv Law Review IV(5):193–220
Whatsapp (2016a) Whatsapp security. URL https://www.whatsapp.com/security/. Last Accessed Aug 2016
Whatsapp (2016b) WhatsApp encryption overview. Technical white paper. https://www.whatsapp.com/security/WhatsApp-Security-Whitepaper.pdf. Last Accessed Aug 2016
Zimmermann P (1995) PGP source code and internals. MIT Press, Cambridge, MA
Zittrain J (2009) The future of the internet, and how to stop it. Yale University Press, New Haven & London
Acknowledgments
The authors would like to thank Dr. Leonor Mendoza for her support, insightful comments, and patient assistance. Juan L. Moreno also thanks James Parish, from the Dickson Poon School of Law at King’s College London, for his thorough review of the first draft of the paper.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2017 Springer Science+Business Media LLC
About this entry
Cite this entry
Vidal, G., Moreno, J.L. (2017). Cryptography and Communications Privacy: An Introduction. In: Alhajj, R., Rokne, J. (eds) Encyclopedia of Social Network Analysis and Mining. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-7163-9_110179-1
Download citation
DOI: https://doi.org/10.1007/978-1-4614-7163-9_110179-1
Received:
Accepted:
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-7163-9
Online ISBN: 978-1-4614-7163-9
eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering