New directions in cryptography

@article{Diffie1976NewDI,
  title={New directions in cryptography},
  author={Whitfield Diffie and Martin E. Hellman},
  journal={IEEE Trans. Inf. Theory},
  year={1976},
  volume={22},
  pages={644-654}
}
Two kinds of contemporary developments in cryptography are examined. Widening applications of teleprocessing have given rise to a need for new types of cryptographic systems, which minimize the need for secure key distribution channels and supply the equivalent of a written signature. This paper suggests ways to solve these currently open problems. It also discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long… Expand
Cryptography old and new
TLDR
This tutorial ends with a summary of the recommendations of the Public Cryptography Study Group, which was formed by the American Council on Education at the urging of the National Security Agency. Expand
Multiuser cryptographic techniques
TLDR
It is shown how such a public key cryptosystem would allow the development of an authentication system which generates an unforgeable, message dependent digital signature. Expand
Cryptography and Crypto-Systems
In this section we shall describe what modern cryptographic methods are expected to achieve - the criteria of security they have to meet. It would be convenient if there were proofs of the securityExpand
Recent Developments in Cryptography
TLDR
The aim is to illustrate various applications of public key systems and to motivate the lectures of I.F. Blake and Y. Desmedt. Expand
A Survey of Latest Trends in Cryptography and Elliptic Curve Cryptography
TLDR
This paper gives survey of all such systems and also the comparative study of them with elliptic curve cryptography. Expand
The use of public key cryptography in communication system design
TLDR
A review of public key cryptosystems is presented, followed by examples of communications systems which make particularly elegant use of their properties. Expand
New Vistas in elliptic curve cryptography
TLDR
A brief history of cryptography support in Windows is given and the upcoming architectural changes, including support for ECC, forthcoming in Windows Vista are described. Expand
Processing Techniques in Public Key Cryptosystems
TLDR
The paper examines public key cryptosystems and their modifications from an implementation point of view and finds that the algorithms are themselves under suspicion. Expand
Complexity Issues for Public Key Cryptography
TLDR
The Data Encryption Standard has been in use over the past decade as a reliable and secure data encipherment algorithm and thus an important component in many such systems. Expand
Some Open Problems In Cryptography
  • C. Leung
  • Computer Science
  • ACM Annual Conference
  • 1978
TLDR
This paper describes a method which does not require prior exchange of secret keys for private communication over a public network, and is related to the complexity of solving a certain zero-one integer programming problem. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 25 REFERENCES
Multiuser cryptographic techniques
TLDR
It is shown how such a public key cryptosystem would allow the development of an authentication system which generates an unforgeable, message dependent digital signature. Expand
A high security log-in procedure
TLDR
It is suggested that for the protection of time sharing systems from unauthorized users polynomials over a prime modulus are superior to one-way ciphers derived from Shannon codes. Expand
Communication theory of secrecy systems
  • C. Shannon
  • Mathematics, Computer Science
  • Bell Syst. Tech. J.
  • 1949
TLDR
A theory of secrecy systems is developed on a theoretical level and is intended to complement the treatment found in standard works on cryptography. Expand
Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard
TLDR
This paper presents a meta-modelling system that automates the very labor-intensive and therefore time-heavy and expensive process of manually cataloging and cataloging individual pieces of data to provide real-time information about their owners. Expand
An extension of the Shannon theory approach to cryptography
  • M. Hellman
  • Computer Science
  • IEEE Trans. Inf. Theory
  • 1977
Shannon's information-theoretic approach to cryptography is reviewed and extended. It is shown that Shannon's random cipher model is conservative in that a randomly chosen cipher is essentially theExpand
A user authentication scheme not requiring secrecy in the computer
TLDR
A password scheme is presented which does not require secrecy in the computer and is based on using a function H which the would-be intruder is unable to invert. Expand
The codebreakers : the story of secret writing
CONTENTS Preface to the Revised Edition Preface A Few Words 1. One Day of Magic THE PAGENT OF CRYPTOLOGY 2. The First 3,000 Years 3. The Rise of the West 4. On the Origin of a Species 5. The Era ofExpand
The Design and Analysis of Computer Algorithms
TLDR
This text introduces the basic data structures and programming techniques often used in efficient algorithms, and covers use of lists, push-down stacks, queues, trees, and graphs. Expand
The Art of Computer Programming
TLDR
The arrangement of this invention provides a strong vibration free hold-down mechanism while avoiding a large pressure drop to the flow of coolant fluid. Expand
The art of computer programming: sorting and searching (volume 3)
Apparatus for supporting different nets for various sporting purposes including interengaging tubular rods which are arranged to interconnect and have ground engaging portions suitable to be usefulExpand
...
1
2
3
...