ECU Libraries Catalog

Democratizing cryptography : the work of Whiteld Diffie and Martin Hellman / Rebecca Slayton, editor.

Other author/creatorSlayton, Rebecca, editor.
Format Book and Print
EditionFirst Edition.
Publication Info [New York, N.Y. USA] : Association for Computing Machinery, [2022]
Copyright Notice ©2022
Descriptionxx, 538 pages : illustrations ; 25 cm.
Subject(s)
Series ACM books, 2374-6769 ; #42
ACM books ; #42. ^A1287316
Contents 1 Introduction: The Early Lives and Lasting Legacies of Whitfield Diffie and Martin Hellman -- Rebecca Slayton -- 1.1 Introduction -- 1.2 Early Life and Socialization -- 1.3 Different Paths to Cryptography -- 1.4 Finding an Intellectual Soul Mate -- 1.5 New Directions in Cryptography -- 1.6 Changing the World: The Chapters Ahead -- References
Contents 2 Public Key Cryptography's Impact on Society: How Diffie and Hellman Changed the World -- Paul C. van Oorschot -- 2.1 Introduction -- 2.2 Security Background -- 2.3 Context: Motivation and Environment -- 2.4 Inventive Contributions -- 2.5 Supporting and Related Developments -- 2.6 Major Impacts on Society -- 2.7 Concluding Remarks -- Acknowledgments -- References
Contents 3 Public Key Cryptography in Computer and Network Security -- Paul Kocher -- 3.1 Symmetric Encryption and the Challenge of Scaling Communications Security -- 3.2 Key Management Before Public Key Cryptography -- 3.3 Public Key Cryptography -- 3.4 Digital Signatures and Certificates -- 3.5 Securing Internet Communications -- 3.6 Security Protocols -- 3.7 Beyond Communication -- 3.8 Securing Supply Chains -- 3.9 Protecting Software. . . and Protecting from Software -- 3.10 Protecting Stored Data -- 3.11 Securing Implementations -- 3.12 The Need for Aligned Interests and Transparency -- 3.13 The Potential Impact of Quantum Computing -- 3.14 The Future -- References
Contents 4 The Influence of Public-Key Cryptography on Mathematics -- Johannes Buchmann, Michael J. Jacobson, Jr., and Hugh C. Williams -- 4.1 Introduction -- 4.2 Primes -- 4.3 Factoring Integers -- 4.4 Discrete Logarithms -- 4.5 Elliptic Curves -- 4.6 Algebraic Number Fields -- 4.7 The Quantum Computer -- 4.8 Quantum-resistant Methods -- 4.9 Conclusion -- References
Contents 5 A Gift that Keeps on Giving: The Impact of Public-Key Cryptography on Theoretical Computer Science -- Joan Feigenbaum -- 5.1 Introduction -- 5.2 New Concepts in TCS -- 5.3 New Characterizations of Complexity Classes -- 5.4 Conclusion -- References
Contents 6 Creating an Open Community of Cryptographers -- Hilarie Orman -- 6.1 Introduction -- 6.2 Initialization -- 6.3 Shifting in Parallel -- 6.4 Expanding in New Directions with New People -- 6.5 Compression -- 6.6 Expansion -- 6.7 Permutation and Translation -- 6.8 Output -- 6.9 Timeline of Early Events in the Discovery of Public-key Cryptography -- References
Contents 7 The Development of a Crypto Policy Community: Diffie-Hellman's Impact on Public Policy -- Susan Landau -- 7.1 The Prologue -- 7.2 These, Our Actors -- 7.3 Action from an Unexpected Front: The Pentagon Papers and the White House "Plumbers" -- 7.4 You Can't Publish That-and Other Forms of Control -- 7.5 A Shift to Controlling Federal Encryption Standards -- 7.6 Controlling the Sale of Cryptography -- 7.7 The Second Crypto War -- 7.8 The Lasting Public Policy Legacy of Diffie and Hellman's Work -- Acknowledgments -- References
Contents 8 An Interview with Whitfield Diffie -- 9 An Interview with Martin Hellman -- 10 Information Security -- 11 Cybersecurity, Nuclear Security, Alan Turing, and Illogical Logic
Contents 12 New Directions in Cryptography -- Whitfield Diffie and Martin E. Hellman -- Abstract -- 12.1 Introduction -- 12.2 Conventional Cryptography -- 12.3 Public Key Cryptography -- 12.4 One Way Authentication -- 12.5 Problem Interrelations and Trap Doors -- 12.6 Computational Complexity -- 12.7 Historical Perspective -- References
Contents 13 Exhaustive Cryptanalysis of the NBS Data Encryption Standard -- Whitfield Diffie and Martin E. Hellman -- 13.1 Introduction -- 13.2 The Basic Argument -- 13.3 Objections to the Basic Argument -- 13.4 System Architecture -- 13.5 Chip Design -- 13.5 Chip Design -- 13.7 Variable Key-size Techniques -- 13.8 Discussion -- Acknowledgment -- References
Contents 14 An Improved Algorithm for Computing Logarithms over GF(p) and Its Cryptographic Significance -- Stephen C. Pohlig and Martin E. Hellman -- Abstract -- 14.1 Introduction -- 14.2 Use in Cryptography -- 14.3 An Algorithm for p = 2n + 1 -- 14.4 An Algorithm for Arbitrary Primes -- 14.5 Discussion -- References
Contents 15 Privacy and Authentication: An Introduction to Cryptography -- Whitfield Diffie and Martin E. Hellman -- Abstract -- 15.1 Introduction -- 15.2 Cryptographic Fundamentals -- 15.3 Examples of Systems and Solutions -- 15.4 Cryptographic Taxonomy -- 15.5 Cryptography in Practice -- 15.6 Applications of Cryptography -- 15.7 Selected Bibliography -- References -- Contributors
Bibliography noteIncludes bibliographical references and index.
Issued in other formOnline version:
ISBN9781450398275 (hardcover)
ISBN1450398278 (hardcover)
ISBN9781450398251 (paperback)
ISBN1450398251 (paperback)
ISBN9781450398268 (EPUB)
ISBN145039826X (EPUB)
ISBN9781450398282 (eBook)
ISBN1450398286 (eBook)

Available Items

Library Location Call Number Status Item Actions
Joyner General Stacks RC87 .S539 2022 ✔ Available Place Hold