Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article
Free access

Cryptographic technology: fifteen year forecast

Published: 01 September 1982 Publication History

Abstract

This paper examines the forces driving public development of cryptography today and projects the course of the field over the next fifteen years with attention to the possible influence of government regulation.This paper was prepared, under contractual arrangements to CRC Systems, in support of the Commerce Department (National Telecommunications and Information Administration, Special Projects Office) response to a White House Office of Science and Technology Policy request that the secretaries of the Departments of Commerce and Defense propose a national policy on cryptography.

References

[1]
{ACE} Draft Final Report of the American Council on Education, Public Cryptography Study Group, January 1981.
[2]
{Burstyn} H. P. Burstyn, "Slow Growing Encryption Market to Spurt in '80's," Electrical Buisness, January 1979, pp. 76--77.
[3]
{COMSAT 79} S. Lu and L. Lee, "A Simple and Effective Public Key Cryptosystem," Comsat Technical Review, Vol. 9, No. 1, Spring 1979. This paper was published without review outside Comsat and immediately exposed as a rediscovery of a system considered by Rivest, Shamir, and Adleman and rejected as weak. Their analysis appears in: Ron Rivest and Len Adleman, "How to Break the Lu-Lee Cryptosystem," to appear, Computer Security Journal.
[4]
{DES} "Data Encryption Standard," Federal Information Standards Publication 46, National Bureau of Standards, 15 January 1977.
[5]
{Diffie76a} Whitfield Diffie and Martin E. Hellman, "Multiuser Cryptographic Techniques" National Computer Conference, New York, 7-10 June 1976, pp. 109--112.
[6]
{Diffie 76b} Whitfield Diffie and Martin E. Hellman, "New Directions in Cryptography" IEEE Transactions on Information Theory, Vol. IT-22, No. 6, November 1976, pp. 644--654.
[7]
{Diffie 77} Whitfield Diffie and Martin E. Hellman, "Exhaustive Cryptanalysis of the NBS Data Encryption Standard," Computer, Vol. 10, No. 6 June 1977, pp. 74--84.
[8]
{Diffie 80} Unpublished calculations by Diffie based on 1980 conversations with Advanced Micro Devices personal.
[9]
{Electronics} "NEC Systems Recognize and Speaker's Words," Electronics, 19 June 1980, pp. 69--70.
[10]
{EMMS} "Typewriters With Ears, Words with Pix," Electronic Mail and Message Systems, Vol. 4, No. 18, 15 September 1980.
[11]
{IRD} International Resource Development, "Data and Voice Encryption," March 1979, p. 62.
[12]
{ITAR80} "Revision of the International Tariff in Arms Regulations," Federal Register, 45-FR-83970-95, 19 December 1980.
[13]
{Kahn} David Kahn, "The Codebreakers, The Story of Secret Writing," New York: Macmillan, 1967.
[14]
{MAPTEK} "Unscrambling the Encryption Market," Quantum Science Corporation, MAPTEK Brief vol. 78, no. 424, 31 March 1978.
[15]
{Merkle} R. C. Merkle and M. E. Hellman, "Hiding Information and Signatures in Trapdoor Knapsacks" IEEE Transactions on Information Theory, Vol. IT-24, No. 5, September 1978, pp. 525--530.
[16]
{Myers} Frank H. Myers, "A Data Link Encryption System," National Telecommunications Conference, Washington, D.C., 27--29 November 1979.
[17]
{NBS76} "Report of the 1976 Workshop on Estimation of Significant Advances in Computer Technology" National Bureau of Standards, 30-31 August 1976.
[18]
{Progressive} The article, "The H-Bomb Secret, How we got it - Why We're Telling It," by Howard Morland was finally published in The Progressive for November 1979. Most of this issue and the May 1979, "Born Secret," issue of The Progressive are devoted to explaining the legal battle.
[19]
{Rivest} R. L. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public Key Cryptosystmes," Communications of the ACM, Vol. 21, No. 2, February 1978, pp. 120--126.
[20]
{Shanning} Brian P. Shanning, "Data Encryption with Public Key Distribution," IEEE EASCON 79, Washington, D.C., 9-11 October 1979.
[21]
{Simmons} Gustavus J. Simmons, "Message Authentication Without Secrecy: A Secure Communications Problem Uniquely Solvable by Asymetric Encryption Techniques," IEEE EASCON '79, Washington, D.C., 9-11 October 1979.
[22]
{Spectrum} Gadi Kaplan, "Words Into Action I," IEEE Spectrum, Vol. 17, No. 6, June 1980, pp. 22--25.
[23]
{Spectrum} Raj Reddi, "Words Into Action II," IEEE Spectrum, Vol. 17, No. 6, June 1980, pp. 26--28.
[24]
{Spectrum} Yasuo Kato, "Words Into Action III," IEEE Spectrum, Vol. 17, No. 6, June 1980, p. 29.
[25]
{Wade80} Nicolas Wade, "Science Meetings Catch U.S. - Soviet Chill," Science, 7 March 1980, p. 1056.
[26]
{Wyner} Aaron D. Wyner, "An Analog Scrambling Scheme Which Does Not Expand Bandwidth Part I: Discrete Time," IEEE Transactions on Information Theory, Vol. IT-25, No. 3, May 1979, pp. 261--274.
[27]
{Wyner} Aaron D. Wyner, "An Analog Scrambling Scheme Which Does Not Expand Bandwidth, Part II: Continuous Time," IEEE Transactions on Information Theory, Vol. IT-25, No. 4, July 1979, pp. 415--424.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGACT News
ACM SIGACT News  Volume 14, Issue 4
Fall-Winter 1982
46 pages
ISSN:0163-5700
DOI:10.1145/1008902
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 September 1982
Published in SIGACT Volume 14, Issue 4

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 643
    Total Downloads
  • Downloads (Last 12 months)115
  • Downloads (Last 6 weeks)11
Reflects downloads up to 05 Jan 2025

Other Metrics

Citations

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media