PortadaGruposCharlasMásPanorama actual
Buscar en el sitio
Este sitio utiliza cookies para ofrecer nuestros servicios, mejorar el rendimiento, análisis y (si no estás registrado) publicidad. Al usar LibraryThing reconoces que has leído y comprendido nuestros términos de servicio y política de privacidad. El uso del sitio y de los servicios está sujeto a estas políticas y términos.

Resultados de Google Books

Pulse en una miniatura para ir a Google Books.

Cargando...

Cryptography: A Primer

por Alan G. Konheim

MiembrosReseñasPopularidadValoración promediaConversaciones
381653,286 (2.5)Ninguno
CrypTography: a Primer Alan G. Konheim Here's the first systematic, unclassified treatment of the theory and practice of encipherment--an essential tool for protecting the contents of computer data. Cryptography: a Primer develops the principles of encryption and reviews many of the classical systems. This helpful book shows you how to apply these systems to your individual data processing requirements. A uniquely practical reference and a step-by-step approach for the student.… (más)
Añadido recientemente porSldc, _adam, dlcotter, racingmars, lakkal
Ninguno
Cargando...

Inscríbete en LibraryThing para averiguar si este libro te gustará.

Actualmente no hay Conversaciones sobre este libro.

(Original Review, 1981)

In the late 60's, IBM started a research project on ciphers that has produced a lot of good literature and several important cryptosystems. The effort concentrated on a family of ciphers that lent itself to high-speed implementation in hardware (one can imagine the fun second source memory manufacturers will have when the Series H uses an encryption protected fiber optic bus). In January 1976, one of these systems was adopted by the National Bureau of Standards (NBS) as the federal Data Encryption Standard (DES) on sensitive but unclassified data. Cryptanalysis by Whit Diffie, Martin E. Hellman, and others has not found an algorithmic attack any better than a 50% computational savings over an exhaustive search of the keyspace. Unfortunately, the key is only 56 bits, and Diffie and Hellman have calculated that for only 20 megabucks, a computer could build around a million LSI chips each testing a key per microsecond. This system could search the entire key-space in approximately a day, at an average cost of $5,000. This was calculated in 1977, and needless to say it would be much cheaper today, not to mention in the future.

There have been some fairly believable allegations that the National Security Agency (NSA, or No Such Agency), which is responsible for foreign communications intelligence and code-breaking, brought pressure to bear so that the key would be small enough for them to search in the eventuality a foreign power were to use the DES. On the other hand, this indicates that the NSA was not able to cryptanalyticly crack DES, and that those desiring really secure communications can merely use a larger key. Both Diffie and Hellman, and IBM have suggested that multiple encipherment could also improve the security of DES, but it is pretty obvious that its preferable to improve the
standard.

Fortunately, between the IBM research, and the recent public key cryptosystems by Diffie and Hellman, and Ron Rivest, enough technology exists so that anyone desiring to create a secure system should be able to do so. Supposedly, one could, for $100 zillion dollars, build a 'sooper' computer that could decode any encrypted message in about a day. An American friend of mine pointed out that, if one was worried about security, one could run the message through the encoder 'n' times, to give it 64*n bits of encryption. That seemed reasonable to me, as I haven't got the math background to prove/disprove it. And remember that the NBS DES was designed to give reasonable amounts of protection to very large amounts of data, so it had to be FAST, rather than SECURE. One time (bit) pads are the ultimate in security, but require both the sender and the receiver to have the pads before a message can be sent. . . If you want to break security on a time sharing system, do systat to find out who's logged in, then try to log in as them, using a) null passwords, b) all 1&2 letter combinations, c) common female first names, d) English (or Portuguese depending on the system’s origin) words. Several years ago, someone used the word dictionary, the encryption algorithm, and the encrypted password file to break 70% of the accounts on a Unix system.

PS 1. For more information about modern cryptography techniques see: Diffie, W. and M. Hellman, "Privacy and Authentication: An Introduction to Cryptography", Proc. of the IEEE, vol. 67, no. 3, pp. 397-427, March 1979. This paper is a tutorial introduction to modern cryptography and contains one of the best bibliographies of work in this field. If you can’t get the paper, read this Konheim’s primer. It’s pretty good. ( )
  antao | Nov 3, 2018 |
sin reseñas | añadir una reseña
Debes iniciar sesión para editar los datos de Conocimiento Común.
Para más ayuda, consulta la página de ayuda de Conocimiento Común.
Título canónico
Título original
Títulos alternativos
Fecha de publicación original
Personas/Personajes
Lugares importantes
Acontecimientos importantes
Películas relacionadas
Epígrafe
Dedicatoria
Primeras palabras
Citas
Últimas palabras
Aviso de desambiguación
Editores de la editorial
Blurbistas
Idioma original
DDC/MDS Canónico
LCC canónico

Referencias a esta obra en fuentes externas.

Wikipedia en inglés

Ninguno

CrypTography: a Primer Alan G. Konheim Here's the first systematic, unclassified treatment of the theory and practice of encipherment--an essential tool for protecting the contents of computer data. Cryptography: a Primer develops the principles of encryption and reviews many of the classical systems. This helpful book shows you how to apply these systems to your individual data processing requirements. A uniquely practical reference and a step-by-step approach for the student.

No se han encontrado descripciones de biblioteca.

Descripción del libro
Resumen Haiku

Debates activos

Ninguno

Cubiertas populares

Enlaces rápidos

Valoración

Promedio: (2.5)
0.5
1 1
1.5
2
2.5
3
3.5
4 1
4.5
5

¿Eres tú?

Conviértete en un Autor de LibraryThing.

 

Acerca de | Contactar | LibraryThing.com | Privacidad/Condiciones | Ayuda/Preguntas frecuentes | Blog | Tienda | APIs | TinyCat | Bibliotecas heredadas | Primeros reseñadores | Conocimiento común | 205,929,328 libros! | Barra superior: Siempre visible