Privacy and authentication: An introduction to cryptography
- 1 March 1979
- journal article
- research article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in Proceedings of the IEEE
- Vol. 67 (3), 397-427
- https://doi.org/10.1109/proc.1979.11256
Abstract
This paper presents a tutorial introduction to contemporary cryptography. The basic information theoretic and computational properties of classical and modern cryptographic systems are presented, followed by cryptanalytic examination of several important systems and an examination of the application of cryptography to the security of timesharing systems and computer networks. The paper concludes with a guide to the cryptographic literature.Keywords
This publication has 53 references indexed in Scilit:
- Hiding information and signatures in trapdoor knapsacksIEEE Transactions on Information Theory, 1978
- The Gaussian wire-tap channelIEEE Transactions on Information Theory, 1978
- An improved algorithm for computing logarithms overGF(p)and its cryptographic significance (Corresp.)IEEE Transactions on Information Theory, 1978
- Computer Encryption and the National Security Agency ConnectionScience, 1977
- An extension of the Shannon theory approach to cryptographyIEEE Transactions on Information Theory, 1977
- New directions in cryptographyIEEE Transactions on Information Theory, 1976
- A high security log-in procedureCommunications of the ACM, 1974
- A user authentication scheme not requiring secrecy in the computerCommunications of the ACM, 1974
- Cryptography and Computer PrivacyScientific American, 1973
- Shift-register synthesis and BCH decodingIEEE Transactions on Information Theory, 1969