Abstract
This chapter introduces the concept of cryptography, or mathematical codes used to protect data. It can be a tough concept. To help make this concept more comprehensible, this chapter covers some of the goals and requirements for cryptography. It then uses some historical examples to illustrate a subset of these principles. People have been using secret codes since before computers. These examples can be easier to understand but can also effectively introduce some concepts like key size, block size, brute force, block ciphers, stream ciphers, and cryptanalysis.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Obviously, the Roman alphabet was not exactly the same, but hopefully the idea is clear.
- 2.
While security through obscurity is largely viewed as harmful, there is still a debate about it [143].
- 3.
Although not shown here, there is a way of converting each permutation into a number so that it is easy to identify the key beyond just writing out the entire permutation.
- 4.
I am not endorsing clandestine communications between violent criminals. If this example causes you any moral consternation, you may consider the prisoner to be a political prisoner that protested against an ideology of your choice.
References
Adkins, A. 1997. Secret war: The navajo code talkers in world war II. New Mexico Historical Review 72(4): 10.
Almeshekah, M.H., E.H. Spafford, and M.J. Atallah. 2013. Improving security using deception. Technical Report 13, Purdue University, 11. CERIAS Tech Report 2013-13.
Anderson, R.J. 1993. Why cryptosystems fail. In Proceedings of the 1st ACM Conference on Computer and Communications Security (CCS’93), New York, 215–227. Association for Computing Machinery.
Anderson, R.J. 2020. Security Engineering: A Guide to Building Dependable Distributed Systems, 3 ed. Wiley Publishing.
Bishop, M. 2019. Computer Security Art and Science, 2nd ed. Addison-Wesley Professional.
Bruce, S. 1996. Applied Cryptography: Protocols, Algorithms, and Source Code in C.-2nd. Wiley.
Huffman, S. 2000. The navajo code talkers: A cryptologic and linguistic perspective. Cryptologia 24(4): 289–320.
Johansson, J.M., and R. Grimes. 2008. The great debate: Security by obscurity. TechNet Magazine.
Kahn, D. 1996. The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet. Scribner.
Kennedy, D.M. 1999. Victory at sea. The Atlantic Monthly 51–76. www.theatlantic.com/magazine/archive/1999/03/victory-at-sea/306272/.
Maffeo, S.E. 2000. Most Secret and Confidential, Intelligence in the Age of Nelson. Naval Institute Press.
Menezes, A.J., S.A. Vanstone, and P.C.V. Oorschot. 1996. Handbook of Applied Cryptography, 1st ed. Boca Raton: CRC Press, Inc.
Parshall, J., A. Tully, and J.B. Lundstrom. 2005. Shattered sword: The untold story of the Battle of Midway. Washington, DC: Potomac Books.
Siddiqui, R. 2013. Alan turing: A note on his role as world war II cryptanalyst. International Journal of Applied Engineering and Technology ISSN: 2277-212X (Online) 3: 21–26.
Symonds, C. 2011. The Battle of Midway, Pivotal Moments in American History. Oxford University Press.
Tuohy, W. 2007. America’s Fighting Admirals. Zenith Press.
Wilcox, J. 2015. Solving the ENIGMA: History of the Cryptanalytic Bombe. National Security Agency Center for Cryptologic History.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature
About this chapter
Cite this chapter
Nielson, S.J. (2023). Cryptography Foundations. In: Discovering Cybersecurity. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-9560-1_4
Download citation
DOI: https://doi.org/10.1007/978-1-4842-9560-1_4
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-9559-5
Online ISBN: 978-1-4842-9560-1
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books