Cryptography Reference
In-Depth Information
2. Steven Levy,
Crypto: How the Code Rebels Beat the Government, Saving Privacy in the
Digital Age
(New York: Viking, 2001).
3. Jim L. Massey, “An Introduction to Contemporary Cryptography,”
Proceedings of
the IEEE
76, no. 5 (1988), 535. Other examples include: “Since the turn of the
century, many mathematicians have attempted to find objective criteria to measure
the security of cryptographic systems, transforming an ancient art into an exact
science,” Gilles Brassard,
Cryptologie contemporaine
(Paris: Masson, 1992), 2; “Cryp-
tography, over the ages, has been an art practiced by many who have devised ad
hoc techniques to meet some of the information security requirements. The last
twenty years have been a period of transition as the discipline moved from an art
to a science,” Menezes, van Oorschot, and Vanstone,
Handbook of Applied Cryptog-
raphy
, 6; and “We emphasize two aspects of the transition from classical to modern
cryptography: . . . (2) the move from an engineering-art which strives on ad-hoc
tricks to a scientific discipline based on rigorous approaches and techniques,” Oded
Goldreich,
Modern Cryptography, Probabilistic Proofs, and Pseudorandomness
(Berlin:
Springer, 1999), vii.
4. Jacques Stern,
La science du secret
(Paris: Editions Odile Jacob, 1998), 10.
5. David Kahn,
The Codebreakers: The Story of Secret Writing
(New York: Macmillan,
1967).
6. Ibid., 109-110.
7. Statistical methods still apply to some degree because identical elements in the
plaintext encrypted by the same portion of the key result in identical ciphertext
elements. See Douglas R. Stinson,
Cryptography: Theory and Practice
(Boca Raton: CRC
Press, 1995), 31-36, and Kahn,
The Codebreakers
, 208-213.
8. Kahn,
The Codebreakers
, 150-151, 192.
9. “Several factors suggest that codes may be more difficult to break than ciphers:
the key (code-book) is vastly larger than typical cipher keys; codes may result in
data compression; and statistical analysis is complicated by the large plaintext unit
block size.” Menezes, van Oorschot, and Vanstone,
Handbook of Applied Cryptography
,
241.
10. Kahn,
The Codebreakers
, 174.
11. Ibid., 192.
12. Auguste Kerckhoffs, “La cryptographie militaire,”
Journal des Sciences Militaires
9
(1883): 6-7. Similarly, “Although modern cryptographic techniques started to
develop during the Renaissance, we find in 1641 that John Wilkins still preferred
hiding over ciphering because it arouses less suspicion.” Fabien Petitcolas, Ross
Anderson, and Markus Kuhn, “Information Hiding—A Survey,”
Proceedings of the
IEEE
87, no. 7 (1999): 1062-1078.