Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
An introduction to cryptography
Diffie W. (ed), Hellman M., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471262336)
Date Reviewed: Feb 1 1986

This chapter is a revised version of the authors’ classic paper [1]. It is an excellent introduction to the field owing to its broad coverage and superb bibliography. The paper has the following outline:

  • (1) Cryptographic Fundamentals: Privacy and Authentication; Basic Concepts; Cryptanalytic Attacks; Unconditional and Computational Security; Public-Key Systems; Digital Signatures.

  • (2) Examples of Systems and Solutions: Substitution; Transposition; Polyalphabetic Ciphers; Coherent Running Key Cipher; Codes; Hagelin Machine; Rotor Machine; Shift Registers; IBM Systems and DES; Analog Systems; Public-Key Distribution Systems; RSA Public-Key Cryptosystem; Trapdoor Knapsacks.

  • (3) Cryptographic Taxonomy: Block and Stream Ciphers; Cryptosystems as Finite Automata; Structure of Some Synchronous Systems; Some Systems Derived from Block Systems.

  • (4) Cryptography in Practice: Key Management; Indicators; Traffic Analysis and Playback; Error Control; Operation and Maintenance; Integration with Other Security Measures; Certification.

  • (5) Applications of Cryptography: Time-Sharing Systems; Communication Cryptography.

The only weakness of this paper is the fact that it is rapidly becoming outdated. The authors do not, for example, discuss or have any references to the breaking by Shamir [2], Adleman [3], and Brickell [4] of the trapdoor knapsack schemes, or to the elegant probabilistic encryption schemes of Goldwasser and Micali [5]. It is also missing references to work after 1979, and a lot has happened in the field since then. Nonetheless, this remains my first choice as an introductory paper in the field.

Reviewer:  R. L. Rivest Review #: CR123182
1) Diffie, W.; and Hellman, M. E.Privacy and authentication: an introduction to cryptography, Proc. IEEE 67 (1979), 397–427.
2) Shamir, A.A polynomial-time algorithm for breaking the basic Merkle-Hellman cryptosystem, in Proc. of the 23rd symposium on foundations of computer science (1982), IEEE, New York, 1982, 145–152.
3) Adleman, L.On breaking generalized knapsack public-key cryptosystems, in Proc. of the 15th ACM symposium on theory of computing (Boston, MA, April 25–27, 1983), ACM, New York, 1983, 402–412.
4) Brickell, E. F.Solving low density knapsacks, in Advances in cryptology, Proc. of Crypto 83, Plenum, New York, 1984, 25–37.
5) Goldwasser, S.; and Micali, S.Probabilistic encryption, J. Comput. Syst. Sci. 28 (1984), 270–299.
Bookmark and Share
 
Data Encryption (E.3 )
 
 
Cryptographic Controls (D.4.6 ... )
 
 
Security and Protection (C.2.0 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Data Encryption": Date
ESA/390 integrated cryptographic facility
Yeh P., Ronald M. S. IBM Systems Journal 30(2): 192-205, 1991. Type: Article
Feb 1 1992
Design and implementation of an RSA cryptosystem using multiple DSP chips
Er M., Wong D., Sethu A., Ngeow K. Microprocessors & Microsystems 15(7): 369-378, 1991. Type: Article
Nov 1 1993
Mathematical cryptology for computer scientists and mathematicians
Patterson W., Rowman & Littlefield Publishers, Inc., Totowa, NJ, 1987. Type: Book (9789780847674381)
Apr 1 1988
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy