Cryptography Foundations

  • Chapter
  • First Online:
Discovering Cybersecurity
  • 400 Accesses

Abstract

This chapter introduces the concept of cryptography, or mathematical codes used to protect data. It can be a tough concept. To help make this concept more comprehensible, this chapter covers some of the goals and requirements for cryptography. It then uses some historical examples to illustrate a subset of these principles. People have been using secret codes since before computers. These examples can be easier to understand but can also effectively introduce some concepts like key size, block size, brute force, block ciphers, stream ciphers, and cryptanalysis.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Obviously, the Roman alphabet was not exactly the same, but hopefully the idea is clear.

  2. 2.

    While security through obscurity is largely viewed as harmful, there is still a debate about it [143].

  3. 3.

    Although not shown here, there is a way of converting each permutation into a number so that it is easy to identify the key beyond just writing out the entire permutation.

  4. 4.

    I am not endorsing clandestine communications between violent criminals. If this example causes you any moral consternation, you may consider the prisoner to be a political prisoner that protested against an ideology of your choice.

References

  1. Adkins, A. 1997. Secret war: The navajo code talkers in world war II. New Mexico Historical Review 72(4): 10.

    Google Scholar 

  2. Almeshekah, M.H., E.H. Spafford, and M.J. Atallah. 2013. Improving security using deception. Technical Report 13, Purdue University, 11. CERIAS Tech Report 2013-13.

    Google Scholar 

  3. Anderson, R.J. 1993. Why cryptosystems fail. In Proceedings of the 1st ACM Conference on Computer and Communications Security (CCS’93), New York, 215–227. Association for Computing Machinery.

    Google Scholar 

  4. Anderson, R.J. 2020. Security Engineering: A Guide to Building Dependable Distributed Systems, 3 ed. Wiley Publishing.

    Book  Google Scholar 

  5. Bishop, M. 2019. Computer Security Art and Science, 2nd ed. Addison-Wesley Professional.

    Google Scholar 

  6. Bruce, S. 1996. Applied Cryptography: Protocols, Algorithms, and Source Code in C.-2nd. Wiley.

    MATH  Google Scholar 

  7. Huffman, S. 2000. The navajo code talkers: A cryptologic and linguistic perspective. Cryptologia 24(4): 289–320.

    Article  Google Scholar 

  8. Johansson, J.M., and R. Grimes. 2008. The great debate: Security by obscurity. TechNet Magazine.

    Google Scholar 

  9. Kahn, D. 1996. The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet. Scribner.

    Google Scholar 

  10. Kennedy, D.M. 1999. Victory at sea. The Atlantic Monthly 51–76. www.theatlantic.com/magazine/archive/1999/03/victory-at-sea/306272/.

  11. Maffeo, S.E. 2000. Most Secret and Confidential, Intelligence in the Age of Nelson. Naval Institute Press.

    Google Scholar 

  12. Menezes, A.J., S.A. Vanstone, and P.C.V. Oorschot. 1996. Handbook of Applied Cryptography, 1st ed. Boca Raton: CRC Press, Inc.

    MATH  Google Scholar 

  13. Parshall, J., A. Tully, and J.B. Lundstrom. 2005. Shattered sword: The untold story of the Battle of Midway. Washington, DC: Potomac Books.

    Google Scholar 

  14. Siddiqui, R. 2013. Alan turing: A note on his role as world war II cryptanalyst. International Journal of Applied Engineering and Technology ISSN: 2277-212X (Online) 3: 21–26.

    Google Scholar 

  15. Symonds, C. 2011. The Battle of Midway, Pivotal Moments in American History. Oxford University Press.

    Google Scholar 

  16. Tuohy, W. 2007. America’s Fighting Admirals. Zenith Press.

    Google Scholar 

  17. Wilcox, J. 2015. Solving the ENIGMA: History of the Cryptanalytic Bombe. National Security Agency Center for Cryptologic History.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Nielson, S.J. (2023). Cryptography Foundations. In: Discovering Cybersecurity. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-9560-1_4

Download citation

Publish with us

Policies and ethics

Navigation