Democratizing Cryptography最新文献

筛选
英文 中文
Introduction: The Early Lives and Lasting Legacies of Whitfield Diffie and Martin Hellman 简介:惠特菲尔德·迪菲和马丁·赫尔曼的早期生活和持久的遗产
Democratizing Cryptography Pub Date : 2022-08-24 DOI: 10.1145/3549993.3549996
R. Slayton
{"title":"Introduction: The Early Lives and Lasting Legacies of Whitfield Diffie and Martin Hellman","authors":"R. Slayton","doi":"10.1145/3549993.3549996","DOIUrl":"https://doi.org/10.1145/3549993.3549996","url":null,"abstract":"","PeriodicalId":305424,"journal":{"name":"Democratizing Cryptography","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115174018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Gift that Keeps on Giving: The Impact of Public-Key Cryptography on Theoretical Computer Science 不断赠送的礼物:公钥密码学对理论计算机科学的影响
Democratizing Cryptography Pub Date : 2022-08-24 DOI: 10.1145/3549993.3550000
J. Feigenbaum
{"title":"A Gift that Keeps on Giving: The Impact of Public-Key Cryptography on Theoretical Computer Science","authors":"J. Feigenbaum","doi":"10.1145/3549993.3550000","DOIUrl":"https://doi.org/10.1145/3549993.3550000","url":null,"abstract":"5.","PeriodicalId":305424,"journal":{"name":"Democratizing Cryptography","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132238102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Creating an Open Community of Cryptographers 创建一个开放的密码学家社区
Democratizing Cryptography Pub Date : 2022-08-24 DOI: 10.1145/3549993.3550001
H. Orman
{"title":"Creating an Open Community of Cryptographers","authors":"H. Orman","doi":"10.1145/3549993.3550001","DOIUrl":"https://doi.org/10.1145/3549993.3550001","url":null,"abstract":"","PeriodicalId":305424,"journal":{"name":"Democratizing Cryptography","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133588362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Influence of Public-Key Cryptography on Mathematics 公钥密码学对数学的影响
Democratizing Cryptography Pub Date : 2022-08-24 DOI: 10.1145/3549993.3549999
J. Buchmann, M. Jacobson, H. Williams
{"title":"The Influence of Public-Key Cryptography on Mathematics","authors":"J. Buchmann, M. Jacobson, H. Williams","doi":"10.1145/3549993.3549999","DOIUrl":"https://doi.org/10.1145/3549993.3549999","url":null,"abstract":"","PeriodicalId":305424,"journal":{"name":"Democratizing Cryptography","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116853371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity, Nuclear Security, Alan Turing, and Illogical Logic 网络安全,核安全,艾伦·图灵和非逻辑逻辑
Democratizing Cryptography Pub Date : 2022-08-24 DOI: 10.1145/3549993.3550006
{"title":"Cybersecurity, Nuclear Security, Alan Turing, and Illogical Logic","authors":"","doi":"10.1145/3549993.3550006","DOIUrl":"https://doi.org/10.1145/3549993.3550006","url":null,"abstract":"","PeriodicalId":305424,"journal":{"name":"Democratizing Cryptography","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124895019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Public Key Cryptography’s Impact on Society: How Diffie and Hellman Changed the World 公钥密码学对社会的影响:迪菲和赫尔曼如何改变世界
Democratizing Cryptography Pub Date : 2022-08-24 DOI: 10.1145/3549993.3549997
P. V. Oorschot
{"title":"Public Key Cryptography’s Impact on Society: How Diffie and Hellman Changed the World","authors":"P. V. Oorschot","doi":"10.1145/3549993.3549997","DOIUrl":"https://doi.org/10.1145/3549993.3549997","url":null,"abstract":"In 1975 and 1976, Whitfield Diffie and Martin Hellman conceived and introduced fundamental new methods that changed how communications are secured. Their landmark paper “New Directions in Cryptography” explained both public key cryptography and what would become known as Diffie-Hellman key exchange. These ideas, influenced and augmented by a few souls within a small community, set the world on a new course by establishing novel cryptographic techniques for protecting information transmitted over untrusted channels. Our aim herein is to consider how public key cryptography has changed the world, and in particular its impact on society. We review the original contributions of Diffie and Hellman, and provide context to relate these to pre-existing and subsequent cryptographic techniques. Aided by this understanding, we connect their contributions to resulting major changes in society. To retain accessibility for non-specialists, our treatment largely avoids mathematical details, while selectively introducing technical terms to maintain technical accuracy. 1 Security background We begin with some basic concepts and terminology to develop a working vocabulary. When information is transmitted over a physical channel (physical line) such as a traditional phone line, cable, or optical fibre, the line may be physically shielded or isolated, to reduce the risk of unauthorized access such as by a physical wiretap. If such a communication channel is accessible to unintended parties, it is called an open or untrusted channel. In general, ordinary information (plaintext) sent over untrusted channels is at risk of interception. For example, plaintext sent over a radio channel is accessible to anyone with a suitable wireless receiver. A common defense is to convert plaintext characters into a related sequence of characters (ciphertext) that are not meaningful even if intercepted. To do so, at the sender’s end a sequence of instructions (called an encryption algorithm) is used to convert plaintext to ciphertext, which is then transmitted. To recover the plaintext, the operation is reversed at the receiver’s end by a decryption algorithm. In this way, encryption provides a confidentiality property, whereby the meaningful content is available only to authorized parties. Unauthorized parties cannot recover the plaintext because the encryption and decryption algorithms require a secret number, which may be viewed as a random string of 0s and 1s; 128 of these would be called a 128-bit cryptographic key. The aim is that only the sender and recipient (i.e., their computing devices) share this secret key.1 Historically, decryption requires the same key as used for encryption; in this case we use the terms symmetric-key algorithms and symmetric keys. Distinct from confidentiality or secrecy is the concept of authentication. The ability to recognize individuals (entity authentication) is taken for granted in human-to-human interactions, but more challenging in written comm","PeriodicalId":305424,"journal":{"name":"Democratizing Cryptography","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126404365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Text and Photo Credits 文字和图片来源
Democratizing Cryptography Pub Date : 2022-08-24 DOI: 10.1145/3549993.3549995
Photo Credits
{"title":"Text and Photo Credits","authors":"Photo Credits","doi":"10.1145/3549993.3549995","DOIUrl":"https://doi.org/10.1145/3549993.3549995","url":null,"abstract":"Page 1 Photographed by Richard Morgenstein, http://www.morgenstein. com/. Page 8 Chuck Painter / Stanford News Service. Heidelberg Laurate Forum Foundation. Page 14 Page 259 Heidelberg Laureate Forum Foundation. “The Heidelberg Laureate Forum Foundation presents the HLF Portraits: Whitfield Diffie.” Online video clip. YouTube, posted Jul 4, 2017. Web. Accessed Aug 17, 2017. Transcript used by permission. Heidelberg Laureate Forum Foundation. “The Heidelberg Laureate Forum Foundation presents the HLF Portraits: Martin Hellman.” Online video clip. YouTube, posted Jul 4, 2017. Web. Accessed Aug 17, 2017. Transcript used by permission. Page 281","PeriodicalId":305424,"journal":{"name":"Democratizing Cryptography","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115736121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman 民主化密码学:Whitfield Diffie和Martin Hellman的工作
Democratizing Cryptography Pub Date : 2022-08-24 DOI: 10.1145/3549993
{"title":"Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman","authors":"","doi":"10.1145/3549993","DOIUrl":"https://doi.org/10.1145/3549993","url":null,"abstract":"","PeriodicalId":305424,"journal":{"name":"Democratizing Cryptography","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130100209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Interview with Martin Hellman 采访马丁·赫尔曼
Democratizing Cryptography Pub Date : 2022-08-24 DOI: 10.1145/3549993.3550004
{"title":"An Interview with Martin Hellman","authors":"","doi":"10.1145/3549993.3550004","DOIUrl":"https://doi.org/10.1145/3549993.3550004","url":null,"abstract":"","PeriodicalId":305424,"journal":{"name":"Democratizing Cryptography","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123166043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Algorithm for Computing Logarithms over GF(p) and Its Cryptographic Significance GF(p)上计算对数的改进算法及其密码学意义
Democratizing Cryptography Pub Date : 2022-08-24 DOI: 10.1145/3549993.3550009
S. Pohlig, M. E. Hellman
{"title":"An Improved Algorithm for Computing Logarithms over GF(p) and Its Cryptographic Significance","authors":"S. Pohlig, M. E. Hellman","doi":"10.1145/3549993.3550009","DOIUrl":"https://doi.org/10.1145/3549993.3550009","url":null,"abstract":"A cryptographic system is described which is secure if and only if computing log­ arithms over GF ( p ) is infeasible. Previously published algorithms for computing this function require O ( p 1 / 2 ) complexity in both time and space. An improved algo­ rithm is derived which requires O ( log 2 p ) complexity if p − 1 has only small prime factors. Such values of p must be avoided in the cryptosystem. Constructive uses for the new algorithm are also described.","PeriodicalId":305424,"journal":{"name":"Democratizing Cryptography","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126279638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信