Encyclopedia of Social Network Analysis and Mining

2018 Edition
| Editors: Reda Alhajj, Jon Rokne

Cryptography and Communications Privacy: An Introduction

  • Gerard Vidal
  • Juan L. Moreno
Reference work entry
DOI: https://doi.org/10.1007/978-1-4939-7131-2_110179



The definitions below follow the glossary in RFC 4949 (IETF 2007b) unless marked with (*):

A finite set of step-by-step instructions for a problem-solving or computation procedure, especially one that can be implemented by a computer

Cipher text or ciphertext

Data that has been transformed by encryption so that its semantic information content (i.e., its meaning) is no longer intelligible or directly available


A cryptographic algorithm for encryption and decryption


An encryption algorithm based on substitution, i.e., a system for providing data confidentiality by using arbitrary groups (called “code groups”) of letters, numbers, or symbols to represent units of plaintext of varying length (i.e., code words cause substitutions of important terms such as Mr. President with Ms. Bloomfield)


The mathematical science that deals with analysis of a cryptographic system to gain knowledge needed to break or circumvent the...

This is a preview of subscription content, log in to check access.



The authors would like to thank Dr. Leonor Mendoza for her support, insightful comments, and patient assistance. Juan L. Moreno also thanks James Parish, from the Dickson Poon School of Law at King’s College London, for his thorough review of the first draft of the paper.


  1. Bernstein DJ, Buchmann J, Dahmen E (2009) Post-quantum cryptography. Springer, Berlin HeildelbergGoogle Scholar
  2. Castells M (2009) The rise of the network society: the information age: economy, society, and culture, vol I, 2nd edn. Wiley-Blackwell, Oxford UKGoogle Scholar
  3. Clark D, Reed D, Saltzer J (1984) End-to-end arguments in system design. ACM Trans Comput Syst 2(4):277–288CrossRefGoogle Scholar
  4. Cohen J (2012) What privacy is for. Harv Law Rev 126(1904):1920–1921Google Scholar
  5. Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644–654MathSciNetzbMATHCrossRefGoogle Scholar
  6. Dingledine R, Mathewson N, Syverson P (2004) Tor: the second-generation onion router. In: Proceedings of the 13th usenix security symposium, Washington DCGoogle Scholar
  7. Dooley JF (2013) A brief history of cryptology and cryptographic algorithms (SpringerBriefs in computer science). Springer, Heidelberg New York Dordrecht LondonzbMATHCrossRefGoogle Scholar
  8. Etzioni A (2016) Apple: good business, poor citizen? J Bus Ethics:1–11Google Scholar
  9. EU-Article 29 Working Party (2013) Advice paper on essential elements of a definition and a provision on profiling within the EU General Data Protection Regulation. Art 29 Data Protection Working Party. http://ec.europa.eu/justice/data-protection/article-29/documentation/other-document/files/2013/20130513_advice-paper-on-profiling_en.pdf. Last Accessed Aug 2016
  10. FBI - Federal Bureau of Investigation (2016) Shooter order compelling. https://assets.documentcloud.org/documents/2714005/SB-Shooter-Order-Compelling-Apple-Asst-iPhone.pdf. Last Accessed Aug 2016
  11. Froomkin AM (1995) The metaphor is the key: cryptography, the clipper chip and the constitution. 143 U Penn L rev 709CrossRefGoogle Scholar
  12. Froomkin AM (1996) It came from planet clipper: the battle over cryptographic key ‘escrow’. U chi L forum 15 (the law of Cyberspace symposium volume)Google Scholar
  13. IETF (1974) Request for comments 675. Specificationf of Internet transmission control program. https://tools.ietf.org/html/rfc675. Last Accessed Aug 2016
  14. IETF (1991) Request for Comments 1180. A TCP/IP tutorial. https://tools.ietf.org/html/rfc1180. Last Accessed Aug 2016
  15. IETF (1996a) Request for comments 1958. Architectural principles of the Internet. https://tools.ietf.org/html/rfc1958. Last Accessed Aug 2016
  16. IETF (1996b) Request for comments 2026. The Internet standards process – revision 3. https://tools.ietf.org/html/rfc2026. Last Accessed Aug 2016
  17. IETF (1998) Request for Comments 2440. OpenPGP Message Format. https://tools.ietf.org/html/rfc2440. Last Accessed Aug 2016
  18. IETF (2001) Request for comments 3160. The Tao of IETF – a novice’s guide to the Internet engineering task force. https://tools.ietf.org/html/rfc3160. Last Accessed Aug 2016
  19. IETF (2007a) Request for Comments 4880. OpenPGP message format. https://tools.ietf.org/html/rfc4880. Last Accessed Aug 2016
  20. IETF (2007b) Request for comments 4949. Internet security glossary, version 2. https://tools.ietf.org/html/rfc4949 . Last accessed Aug 2016
  21. IETF (2011) Request for comments 6071. IP security (IPsec) and Internet Key Exchange (IKE) Document Roadmap. https://tools.ietf.org/html/rfc6071. Last Accessed Aug 2016
  22. IETF (2014) Request for comments 7258. Pervasive monitoring is an attack. https://tools.ietf.org/html/rfc7258. Last Accessed Aug 2016
  23. ITU - International Telecommunication Union (2016) Recommendation X.509. http://www.itu.int/rec/T-REC-X.509/en. Last Accessed Aug 2016
  24. Kahn D (1996) The Codebreakers: the comprehensive history of secret communication from ancient times to the Internet. Scribner, New YorkGoogle Scholar
  25. Kerckhoffs A (1883) La cryptographie militaire (military cryptography). Journal des Sciences Militaires, Vol. IX, pp 161–191Google Scholar
  26. Lessig L (2006) Code v2.0, code and other Laws of cyberspace. basic books New York. Creative commons. http://codev2.cc/. Last Accessed Aug 2016
  27. Nissenbaum H (2004) Privacy as contextual integrity. Wash Law Rev 79(1):101–139Google Scholar
  28. Nissenbaum H (2009) Privacy in context: technology, policy, and the integrity of social life. Stanford University Press, Stanford, CaliforniaGoogle Scholar
  29. NIST – National Institute of Standards and Technology (2001) Federal information processing standards publication announcing the advanced encryption standard (AES). http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf. Last Accessed Aug 2016
  30. Paar C, Pelzi J, Preneel B (2010) Understanding cryptography: a textbook for students and practitioners. Springer, Heidelberg Dordrecht London New YorkGoogle Scholar
  31. Privacy and Civil Liberties Oversight Board (2014a) Report on the surveillance program operated pursuant to section 702 of the Foreign intelligence surveillance act. https://www.pclob.gov/library/702-Report.pdf. Last Accessed Aug 2016
  32. Privacy and Civil Liberties Oversight Board (2014b) Report on the telephone records program conducted under section 215 of the USA PATRIOT act and on the operations of the Foreign intelligence surveillance court. https://www.pclob.gov/library/215-Report_on_the_Telephone_Records_Program.pdf. Last Accessed Aug 2016
  33. Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126MathSciNetzbMATHCrossRefGoogle Scholar
  34. Schneier B (2014) It’s time to break up the NSA. http://edition.cnn.com/2014/02/20/opinion/schneier-nsa-too-big/index.html. Last Accessed Aug 2016
  35. Schneier B (2015) Data and goliath. The hidden battles to collect your data and control your World. W. W Norton & Company, New YorkGoogle Scholar
  36. Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27:379, 423, 623, 656MathSciNetzbMATHCrossRefGoogle Scholar
  37. Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715MathSciNetzbMATHCrossRefGoogle Scholar
  38. Shor P (1997) Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J Comput 26:1484–1509MathSciNetzbMATHCrossRefGoogle Scholar
  39. Singh S (2000) The code book: the science of secrecy from ancient Egypt to quantum cryptography. Anchor Books, New YorkGoogle Scholar
  40. Solove DJ (2008) Data mining and the security-liberty debate. Univ Chicago Law, New Haven & London Rev 74:343Google Scholar
  41. Solove DJ (2011) Nothing to hide: the false tradeoff between privacy and security. Yale University PressGoogle Scholar
  42. Stallman R (2016) Why open source misses the point of free software. https://www.gnu.org/philosophy/open-source-misses-the-point.html. Last Accessed Aug 2016
  43. Tannenbaum AS, Wetherall DJ (2011) Computer networks. Pearson, BostonGoogle Scholar
  44. The Guardian (2016) The NSA files. https://www.theguardian.com/us-news/the-nsa-files. Last Accessed Aug 2016
  45. The Washington Post (2016) How the NSA is tracking people right now. https://www.washingtonpost.com/apps/g/page/world/how-the-nsa-is-tracking-people-right-now/634/. Last Accessed Aug 2016
  46. United Nations (2013) Resolution adopted by the general assembly on 18 December 2013. http://www.un.org/en/ga/search/view_doc.asp?symbol=A/RES/68/167. Last Accessed Aug 2016
  47. Valls-Prieto J (2014) Chapter 10: Fighting cybercrime and protecting privacy: DDoS, spy software, and online attacks. In: Handbook of research on digital crime, cyberspace security, and information assurance. IGI Global, Hershey, PennsylvaniaGoogle Scholar
  48. Warren SD, Brandeis LD (1890) The right to privacy. Harv Law Review IV(5):193–220CrossRefGoogle Scholar
  49. Whatsapp (2016a) Whatsapp security. URL https://www.whatsapp.com/security/. Last Accessed Aug 2016
  50. Whatsapp (2016b) WhatsApp encryption overview. Technical white paper. https://www.whatsapp.com/security/WhatsApp-Security-Whitepaper.pdf. Last Accessed Aug 2016
  51. Zimmermann P (1995) PGP source code and internals. MIT Press, Cambridge, MAGoogle Scholar
  52. Zittrain J (2009) The future of the internet, and how to stop it. Yale University Press, New Haven & LondonGoogle Scholar

Copyright information

© Springer Science+Business Media LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.EnigmediaMenlo ParkUSA
  2. 2.Dickson Poon School of LawKing’s College LondonLondonUK

Section editors and affiliations

  • Rosa M. Benito
    • 1
  • Juan Carlos Losada
    • 2
  1. 1.Universidad Politécnica de MadridMadridSpain
  2. 2.Universidad Politécnica de MadridMadridSpain