Cryptography Reference
In-Depth Information
29. Rivest, Shamir, and Adleman, “A Method for Obtaining Digital Signatures and
Public-Key Cryptosystems,” 122.
30. Loren M. Kohnfelder, “Towards a Practical Public-Key Cryptosystem,” B.S. thesis,
Massachusetts Institute of Technology, Electrical Engineering (1978), 40.
31. These trade-offs are similar to what the credit card industry has faced since its
beginnings. In the 1980s, credit card providers would issue monthly reports of stolen
cards to businesses while also requiring business owners to request authorization
from a clearance center for transactions over a certain threshold. Today, the industry
has largely moved to fully online authorization together with a broad range of fraud
detection mechanisms to manage risk and liability. See Anderson, Security Engineer-
ing , section 10.5.
32. Datamonitor, Public Key Infrastructure, 1999-2003 (n.p., 1999), 6.
33. Such a taxonomy is directly derived from those used to classify encryption
systems—see Rivest, “Cryptology,” 741, and Menezes, van Oorschot, and Vanstone,
Handbook of Applied Cryptography , 41.
34. Rivest, “Cryptology,” 741.
35. See Menezes, van Oorschot, and Vanstone, Handbook of Applied Cryptography ,
4.4.2.
36. Burton Kaliski, “Emerging Standards for Public-Key Cryptography,” in Lectures
on Data Security: Modern Cryptology in Theory and Practice , ed. Ivan Damgård (Berlin:
Springer, 1999), 98.
37. For example, “The security of RSA relies on the difficulty of factorizing n [the
public key]. There are many algorithms for performing this operation, and in order
to thwart the use of any currently known technique, the values p and q must be
chosen carefully.” ITU, Recommendation X.509 (Geneva: International Telecommu-
nications Union, 1997, C.6.2), available at http://www.itu.int/rec/T-REC-X.509
(accessed June 24, 2011).
38. Kaliski, “Emerging Standards for Public-Key Cryptography,” 98.
39. Ibid., 98.
40. Hesse, Models and Analogies in Science , 1.
41. Leslie Lamport, “Constructing Digital Signatures from One-Way Function,”
Technical Report SRI-CSL-98, SRI International (October 1979).
42. David Chaum and Eugène Van Heyst, “Group Signatures,” in EUROCRYPT '91 ,
ed. Donald W. Davies (Berlin: Springer, 1991), 257-265.
43. Viktor Shoup, “Practical Threshold Signatures,” in Advances in Cryptology—
EUROCRYPT 2000 , ed. Bart Preneel (Berlin: Springer, 2000), 207-220.
Search WWH ::




Custom Search