# New directions in cryptography

@article{Diffie1976NewDI, title={New directions in cryptography}, author={Whitfield Diffie and Martin E. Hellman}, journal={IEEE Trans. Inf. Theory}, year={1976}, volume={22}, pages={644-654} }

Two kinds of contemporary developments in cryptography are examined. Widening applications of teleprocessing have given rise to a need for new types of cryptographic systems, which minimize the need for secure key distribution channels and supply the equivalent of a written signature. This paper suggests ways to solve these currently open problems. It also discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long… Expand

#### Paper Mentions

#### 14,248 Citations

Cryptography old and new

- Computer Science
- Comput. Secur.
- 1982

This tutorial ends with a summary of the recommendations of the Public Cryptography Study Group, which was formed by the American Council on Education at the urging of the National Security Agency. Expand

Multiuser cryptographic techniques

- Computer Science
- AFIPS '76
- 1976

It is shown how such a public key cryptosystem would allow the development of an authentication system which generates an unforgeable, message dependent digital signature. Expand

Cryptography and Crypto-Systems

- Computer Science
- 1979

In this section we shall describe what modern cryptographic methods are expected to achieve - the criteria of security they have to meet. It would be convenient if there were proofs of the security… Expand

Recent Developments in Cryptography

- Computer Science
- 1988

The aim is to illustrate various applications of public key systems and to motivate the lectures of I.F. Blake and Y. Desmedt. Expand

A Survey of Latest Trends in Cryptography and Elliptic Curve Cryptography

- Computer Science
- 2016

This paper gives survey of all such systems and also the comparative study of them with elliptic curve cryptography. Expand

The use of public key cryptography in communication system design

- Computer Science
- IEEE Communications Society Magazine
- 1978

A review of public key cryptosystems is presented, followed by examples of communications systems which make particularly elegant use of their properties. Expand

New Vistas in elliptic curve cryptography

- Computer Science
- Inf. Secur. Tech. Rep.
- 2006

A brief history of cryptography support in Windows is given and the upcoming architectural changes, including support for ECC, forthcoming in Windows Vista are described. Expand

Processing Techniques in Public Key Cryptosystems

- Computer Science
- 1985

The paper examines public key cryptosystems and their modifications from an implementation point of view and finds that the algorithms are themselves under suspicion. Expand

Complexity Issues for Public Key Cryptography

- Computer Science
- 1988

The Data Encryption Standard has been in use over the past decade as a reliable and secure data encipherment algorithm and thus an important component in many such systems. Expand

Some Open Problems In Cryptography

- Computer Science
- ACM Annual Conference
- 1978

This paper describes a method which does not require prior exchange of secret keys for private communication over a public network, and is related to the complexity of solving a certain zero-one integer programming problem. Expand

#### References

SHOWING 1-10 OF 25 REFERENCES

Multiuser cryptographic techniques

- Computer Science
- AFIPS '76
- 1976

It is shown how such a public key cryptosystem would allow the development of an authentication system which generates an unforgeable, message dependent digital signature. Expand

A high security log-in procedure

- Computer Science
- CACM
- 1974

It is suggested that for the protection of time sharing systems from unauthorized users polynomials over a prime modulus are superior to one-way ciphers derived from Shannon codes. Expand

Communication theory of secrecy systems

- Mathematics, Computer Science
- Bell Syst. Tech. J.
- 1949

A theory of secrecy systems is developed on a theoretical level and is intended to complement the treatment found in standard works on cryptography. Expand

Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard

- Computer Science
- Computer
- 1977

This paper presents a meta-modelling system that automates the very labor-intensive and therefore time-heavy and expensive process of manually cataloging and cataloging individual pieces of data to provide real-time information about their owners. Expand

An extension of the Shannon theory approach to cryptography

- Computer Science
- IEEE Trans. Inf. Theory
- 1977

Shannon's information-theoretic approach to cryptography is reviewed and extended. It is shown that Shannon's random cipher model is conservative in that a randomly chosen cipher is essentially the… Expand

A user authentication scheme not requiring secrecy in the computer

- Computer Science
- CACM
- 1974

A password scheme is presented which does not require secrecy in the computer and is based on using a function H which the would-be intruder is unable to invert. Expand

The codebreakers : the story of secret writing

- History, Art
- 1968

CONTENTS Preface to the Revised Edition Preface A Few Words 1. One Day of Magic THE PAGENT OF CRYPTOLOGY 2. The First 3,000 Years 3. The Rise of the West 4. On the Origin of a Species 5. The Era of… Expand

The Design and Analysis of Computer Algorithms

- Computer Science
- 1974

This text introduces the basic data structures and programming techniques often used in efficient algorithms, and covers use of lists, push-down stacks, queues, trees, and graphs. Expand

The Art of Computer Programming

- Computer Science
- 1968

The arrangement of this invention provides a strong vibration free hold-down mechanism while avoiding a large pressure drop to the flow of coolant fluid. Expand

The art of computer programming: sorting and searching (volume 3)

- Computer Science
- 1973

Apparatus for supporting different nets for various sporting purposes including interengaging tubular rods which are arranged to interconnect and have ground engaging portions suitable to be useful… Expand