scispace - formally typeset
Search or ask a question

Showing papers on "Multiple encryption published in 1982"


Proceedings ArticleDOI
05 May 1982
TL;DR: This paper proposes an Encryption Scheme that possess the following property : An adversary, who knows the encryption algorithm and is given the cyphertext, cannot obtain any information about the clear-text.
Abstract: This paper proposes an Encryption Scheme that possess the following property : An adversary, who knows the encryption algorithm and is given the cyphertext, cannot obtain any information about the clear-text. Any implementation of a Public Key Cryptosystem, as proposed by Diffie and Hellman in [8], should possess this property. Our Encryption Scheme follows the ideas in the number theoretic implementations of a Public Key Cryptosystem due to Rivest, Shamir and Adleman [13], and Rabin [12].

836 citations


Journal ArticleDOI
I. Ingemarsson, D. Tang1, C. Wong1
TL;DR: This work has shown how to use CKDS in connection with public key ciphers and an authorization scheme and reveals two important aspects of any conference key distribution system: the multitap resistance and the choice of a suitable symmetric function of the private keys.
Abstract: Encryption is used in a communication system to safeguard information in the transmitted messages from anyone other than the intended receiver(s). To perform the encryption and decryption the transmitter and receiver(s) ought to have matching encryption and decryption keys. A clever way to generate these keys is to use the public key distribution system invented by Diffie and Hellman. That system, however, admits only one pair of communication stations to share a particular pair of encryption and decryption keys, The public key distribution system is generalized to a conference key distribution system (CKDS) which admits any group of stations to share the same encryption and decryption keys. The analysis reveals two important aspects of any conference key distribution system. One is the multitap resistance, which is a measure of the information security in the communication system. The other is the separation of the problem into two parts: the choice of a suitable symmetric function of the private keys and the choice of a suitable one-way mapping thereof. We have also shown how to use CKDS in connection with public key ciphers and an authorization scheme.

583 citations


DOI
01 Sep 1982
TL;DR: A variant of the substitution-permutation encryption network, which incorporates random permutations, is presented and shown to retain, with a very high probability, the cryptographically important property of completeness after a small number of rounds.
Abstract: A variant of the substitution-permutation encryption network, which incorporates random permutations, is presented and shown to retain, with a very high probability, the cryptographically important property of completeness after a small number of rounds. Although the increase in crypto-cost is moderate, the advantage of the new variant is twofold, in that a proof for the freedom from an intentional trapdoor is provided and the network can offer a higher level of cryptosecurity.

14 citations



Journal ArticleDOI
TL;DR: It is demonstrated that high security and efficient implementation are not, in reality, compatible goals with the Kravitz-Reed public key encryption system.
Abstract: The Kravitz-Reed public key encryption system, a variant of the MIT system based on Galois fields, is interesting because it offers the potential of high security with efficient implementation In the letter we demonstrate that high security and efficient implementation are not, in reality, compatible goals with this algorithm Efficient implementation is subject to a short cycling attack that exposes the secret key to computation If the parameters of the algorithm are selected for high security, then the algorithm cannot be efficiently implemented

2 citations


Journal ArticleDOI
TL;DR: The market for cryptographic equipment is expected to rapidly expand over the next several years, with potential cost-effective applications to modern computer/communications systems appear to be many and varied.

1 citations


Book ChapterDOI
01 Jan 1982
TL;DR: An account of the algorithm of the Data Encryption Standard is given; it is shown how the same device can conveniently carry out encryption and decryption.
Abstract: An account of the algorithm of the Data Encryption Standard is given; it is shown how the same device can conveniently carry out encryption and decryption. Various criticisms of the cryptographic strength of the algorithm are considered. Four modes of use of the DES are described and recommendations are made regarding the context in which each may be used. Finally reference is made to the need for a well designed key management system.

Proceedings ArticleDOI
Neal R. Wagner1
26 Apr 1982
TL;DR: A two-stage encryption method for sharing access to a database where no single agency or device can ever encrypt or decrypt the data directly and an attack by an opponent would have to succeed at two separate points.
Abstract: This article presents a two-stage encryption method for sharing access to a database where no single agency or device can ever encrypt or decrypt the data directly. Thus an attack by an opponent would have to succeed at two separate points. The main tool needed is a secure cryptosystem closed under composition: encrypting and re-encrypting using two successive keys is equivalent to a single encryption using some third key. An example cryptosystem satisfying this condition is exponentiation modulo a fixed prime.