New directions in cryptography
- 1 November 1976
- journal article
- research article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Information Theory
- Vol. 22 (6) , 644-654
- https://doi.org/10.1109/tit.1976.1055638
Abstract
Two kinds of contemporary developments in cryptography are examined. Widening applications of teleprocessing have given rise to a need for new types of cryptographic systems, which minimize the need for secure key distribution channels and supply the equivalent of a written signature. This paper suggests ways to solve these currently open problems. It also discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.Keywords
This publication has 9 references indexed in Scilit:
- Secure communications over insecure channelsCommunications of the ACM, 1978
- An improved algorithm for computing logarithms overGF(p)and its cryptographic significance (Corresp.)IEEE Transactions on Information Theory, 1978
- Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption StandardComputer, 1977
- An extension of the Shannon theory approach to cryptographyIEEE Transactions on Information Theory, 1977
- Multiuser cryptographic techniquesPublished by Association for Computing Machinery (ACM) ,1976
- A high security log-in procedureCommunications of the ACM, 1974
- A user authentication scheme not requiring secrecy in the computerCommunications of the ACM, 1974
- Reducibility among Combinatorial ProblemsPublished by Springer Nature ,1972
- Communication Theory of Secrecy Systems*Bell System Technical Journal, 1949