scispace - formally typeset
Search or ask a question
Topic

Cipher

About: Cipher is a research topic. Over the lifetime, 9409 publications have been published within this topic receiving 110309 citations. The topic is also known as: cypher & cryptographic algorithm.


Papers
More filters
Book ChapterDOI
23 Mar 1998
TL;DR: The block cipher RC2 was designed in 1989 by Ron Rivest for RSA Data Security Inc. as mentioned in this paper, and preliminary attempts to use both differential and linear cryptanalysis have been made.
Abstract: The block cipher RC2 was designed in 1989 by Ron Rivest for RSA Data Security Inc. In this paper we describe both the cipher and preliminary attempts to use both differential and linear cryptanalysis.

40 citations

Patent
25 Jul 2012
TL;DR: In this paper, the authors proposed a digital content safeguard system based on transparent encryption and decryption, which consists of an access control module, access control monitoring module, certificate authority module, communication proxy module, a management center and a permission server module.
Abstract: The invention belongs to the field of information safety, providing a digital content safeguard system based on transparent encryption and decryption. The system comprises a transparent encryption and decryption module, an access control module, a monitoring module, a certificate authority module, a communication proxy module, a management center and a permission server module, wherein the transparent encryption and decryption module, the access control module and the monitoring module are on a client side, and the management center and the permission server module are on a server side; the client side and the server side are connected by the communication proxy module and the permission server module. Aiming at the safeguard system, the invention provides a dynamic encryption and decryption method which carries out encryption and access control to digital content as well as opens, reads and writes cipher texts. The method realizes transparent encryption and decryption to the digital content by realizing filtering driving on the bottom layer of an operating system and records an intact log to all operation of a user, thus improving system safety, and greatly improving encryption and decryption speed. Compared with the existing like products, the system of the invention has the advantages of safe and efficient encryption mode, fine grit access control, perfect log audit function and convenient and efficient management mode.

40 citations

Book
25 Mar 2013
TL;DR: The author looks at the work of Claude Shannon and the origin and current status of the NSA, including some of its Suite B algorithms such as elliptic curve cryptography and the Advanced Encryption Standard, and explores future directions such as quantum cryptography and DNA computing.
Abstract: Most available cryptology books primarily focus on either mathematics or history. Breaking this mold, Secret History: The Story of Cryptology gives a thorough yet accessible treatment of both the mathematics and history of cryptology. Requiring minimal mathematical prerequisites, the book presents the mathematics in sufficient detail and weaves the history throughout the chapters. In addition to the fascinating historical and political sides of cryptology, the authora former Scholar-in-Residence at the U.S. National Security Agency (NSA) Center for Cryptologic Historyincludes interesting instances of codes and ciphers in crime, literature, music, and art. Following a mainly chronological development of concepts, the book focuses on classical cryptology in the first part. It covers Greek and Viking cryptography, the Vigenre cipher, the one-time pad, transposition ciphers, Jeffersons cipher wheel, the Playfair cipher, ADFGX, matrix encryption, World War II cipher systems (including a detailed examination of Enigma), and many other classical methods introduced before World War II. The second part of the book examines modern cryptology. The author looks at the work of Claude Shannon and the origin and current status of the NSA, including some of its Suite B algorithms such as elliptic curve cryptography and the Advanced Encryption Standard. He also details the controversy that surrounded the Data Encryption Standard and the early years of public key cryptography. The book not only provides the how-to of the Diffie-Hellman key exchange and RSA algorithm, but also covers many attacks on the latter. Additionally, it discusses Elgamal, digital signatures, PGP, and stream ciphers and explores future directions such as quantum cryptography and DNA computing. With numerous real-world examples and extensive references, this book skillfully balances the historical aspects of cryptology with its mathematical details. It provides readers with a sound foundation in this dynamic field.

40 citations

Journal ArticleDOI
TL;DR: The proposed LDMLNCML system possesses prominent cryptographic characteristics, which is very suitable for image encryption, and the proposed image encryption algorithm adopts the strategy of random diffusion.

40 citations

Patent
22 Apr 1998
TL;DR: In this paper, the authors proposed a data transfer method for preventing the malfunction of the conventional equipment which does not cope with encipherment at the time of transmitting enciphered AV information protected by a copyright through an IEEE 1394 bus.
Abstract: A data transfer method for preventing the malfunction of the conventional equipment which does not cope with encipherment at the time of transmitting enciphered AV information protected by a copyright through an IEEE 1394 bus. In the method, cipher identification information indicating the state of encipherment of a real data part and the real data part are contained in synchronous data transferred through isochronous communication and encipherment is effected only on the real data part. According to this method, a transmitter transmits cipher identification information indicating the state of encipherment of the real data part contained in the synchronous data together with real data and a receiver which detects the fact that the real data part has been enciphered from the cipher identification information requests the transmitter to send deciphering information and, upon receiving this information from the transmitter in response to the request, deciphers the real data part by using the deciphering information.

40 citations


Network Information
Related Topics (5)
Cryptography
37.3K papers, 854.5K citations
90% related
Encryption
98.3K papers, 1.4M citations
89% related
Authentication
74.7K papers, 867.1K citations
85% related
Public-key cryptography
27.2K papers, 547.7K citations
85% related
Key (cryptography)
60.1K papers, 659.3K citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023155
2022309
2021343
2020415
2019509
2018487