Abadi, Martin, 66
Absolute rate, of language, 234
Accreditation, 103
Active attacks, 27
Active cheaters, 27
Adams, Carlisle, 334
Adaptive-chosen-plaintext attack, 6
Addition chaining, 244
Adjudicator, 26
Adleman, Leonard M., 163–164, 467
Adler, Roy, 266
Agnew, G. B., 423
Algebraic structure, DES, 282–283
all-or-nothing disclosure of secrets, 543–546
Barrett's, 244
Berlekamp-Massey algorithm, 380, 404
block
breaking, 8
cipher block chaining mode, 193–197, 208–210
cipher block chaining of plaintext difference mode, 208
cipher block chaining with checksum, 207–208
cipher-feedback mode, 200–202, 208–210
cipher mode
summary, 209
classes, 217
coin flipping
using Blum integers, 543
using exponentiation modulo p, 542–543
constant, 238
convertible undeniable signatures, 538–539
cubic, 238
data compression, 226
designated confirmer signatures, 539–540
digital signatures, 39
exponential, 238
factoring, 256
ISO/IEC 9979 registered, 607
Karnin-Greene-Hellman, 530
Khufu, 317
linear, 238
linear syndrome, 381
multiple block
combining, 368
multiple-key public-key cryptography, 527–528
oblivious transfer, 550
one-way accumulators, 543
output-feedback mode, 203–205, 208–210
output feedback with a nonlinear function, 208
plaintext block chaining mode, 208
plaintext feedback mode, 208
polynomial, 238
polynomial-time, 238
probabilistic encryption, 552–554
propagating cipher block chaining mode, 207
quadratic, 238
restricted, 3
secret-sharing algorithms, 528–531
secure multiparty computation, 551–552
self-synchronizing stream cipher, 198–199
subliminal-channel signature, 79
superpolynomial, 238
symmetric, 4
synchronous stream cipher, 202–203
TEA, 346
types, 189
unconditionally secure, 8
undeniable digital signatures, 536–539
vector scheme, 529
zero-knowledge proofs, 548–550
See also Block ciphers; Stream ciphers
All-or-nothing disclosure of secrets, 96, 543–546
voting with a single central facility, 128–130
Alternating stop-and-go generator, 383, 385, 410–411
American National Standards Institute, DES approval, 267–268
Anderson, Ross, 391
ANDOS, see All-or-nothing disclosure of secrets
Anonymous message broadcast, 137–139
ANSI X3.105, 267
ANSI X3.106, 267
ANSI X9.8, 267
key generation, 175
ANSI X9.19, 267
ANSI X9.26, 268
Arbitration, timestamping, 75–76
Arbitrator, 23
AR hash function, 453
Arms Export Control Act, 610
Association for Computing Machinery, 608
Asymmetric algorithms, see Public-key algorithms
Atomic Energy Act, 610
Attack, 5
AT&T Model 3600 Telephone Security Device, 594–595
DASS, 62
Denning-Sacco protocol, 63
dictionary attacks, 52
Kerberos, 60
message, 56
Needham-Schroeder protocol, 58–59
Neuman-Stubblehine protocol, 60–62
protocols, formal analysis, 65–68
Schnorr, 511
SESAME, 572
SKEY, 53
using interlock protocol, 54–55
using one-way functions, 52
using public-key cryptography, 53–54
Wide-Mouth Frog protocol, 56–57
Authenticators, 568
Avalanche effect, 273
Barrett's algorithm, 244
BaseKing, 346
Basis, polarization measurement, 555
Battista, Leon, 11
BBS generator, 417
Beacons, 64
Bellovin, Steve, 518, 520–521, 571
Berlekamp-Massey algorithm, 380, 404
Bernstein, Dan, 616
Berson, Tom, 441
Best affine approximation attack, 381
Beth-Piper stop-and-go generator, 383–384
Bias, 425
Bidirectional message authentication codes, 457
Biham, Eli, 284–285, 288, 296, 301, 303, 306, 308, 311–312, 314, 316, 319, 354, 361, 434
Bilateral stop-and-go generator, 384–385
Binary trees, 78
Biotechnology, as cryptanalysis tool, 156–157
using one-way functions, 87–88
using pseudo-random-sequence generators, 88
using symmetric cryptography, 86–87
Blinding factor, 112
Blind signatures, 112–115, 549–550
patents, 115
Blobs, 88
Block algorithms, 4
CDMF key shortening, 366
combining algorithms, 368
CRYPTO-MECCANO, 346
designing, 351
Feistel networks, 347
group structure, 348
strength against differential and linear cryptanalysis, 348–349
weak keys, 348
doubling length, 363
electronic codebook mode, 189–191, 208–210
encryption speeds, 355
feedback, 193
iterated, 347
Li-Wang algorithm, 346
McEliece algorithm, 346
multiple encryption, 357
Rao-Nam algorithm, 346
REDOC III, 313
security, based on one-way hash functions, 353–354
versus stream ciphers, 210–211
SXAL8/MBAL, 344
using one-way hash functions, 351–354
Block length, doubling, 363
Blocks, 4
Blowfish, 336–339, 354, 647–654
Blum, Blum, and Shub generator, 417–418
Blum integers, 253
coin flipping, 543
zero-knowledge proofs, 549
Blum-Micali generator, 416–417
Boolean functions, in S-boxes, 350
Boyar, Joan, 369
Broadcasting:
Brute-force attack, 8, 151–152
time and cost estimates, 152–154
Bureau of Export Administration, 610–611
Burrows, Michael, 66
Caesar Cipher, 11
CALC, 346
Cascade generators, 405
Cascading:
multiple block algorithms, 367–368
multiple stream ciphers, 419–420
Cash, digital, see Digital cash
Cassells, Ian, 381
S-boxes, 349
CBC, see Cipher block chaining mode
Cellhash, 446
Cellular automata, 500
Cellular automaton generator, 414
Certificates:
Privacy-Enhanced Mail, 579
Certification authority, 186
Certification path, 576
Certified mail, digital, 122–123
Chaining variables, 436
Chaum, David, 84, 115, 133, 137, 536, 549
Cheater, 27
sharing secrets with, 531
Chess Grandmaster Problem, 109
Chinese remainder theorem, 249–250, 470
Chor-Rivest knapsack, 466
Chosen-ciphertext attack, 6–7, 471–472
Chosen-key attack, 7
Chosen-plaintext attack, 6–7, 359
Chosen-text attack, 7
Cipher:
transposition, 12
Cipher block chaining mode, 193–197, 208–210
error extension, 196
initialization vector, 194
message authentication codes, 456
padding, 195
self-recovering, 196
Cipher block chaining of plaintext difference mode, 208
Cipher block chaining with checksum, 207–208
Cipher-feedback mode, 200–202, 208–210
DES, 277
initialization vector, 201
Cipher mode:
auto key, 198
pairs, differential cryptanalysis, 285
stealing, 191
Cleartext, see Plaintext
Clipper key-escrow, 328
Clipper phone, 594
Clock-controlled generators, 381
Clocking, 381
CoCom, 610
Code, 9
Coefficients, solving for, 248
into a well, 92
key generation, 92
using Blum integers, 543
using one-way functions, 90
using public-key cryptography, 90–91
Collision, 166
Collision-free, 30
Collision-resistance, 429
Combination generator, 381
Combining function, 381
Commercial COMSEC Endorsement Program, 269, 598–599
Commercial Data Masking Facility, 366, 574
Common Cryptographic Architecture, 573–574
Common modulus, dangers of, 493
Common modulus attack, RSA, 472
Communications:
using public-key cryptography, 31–34
using symmetric cryptography, 28–29
Communications channels, encryption, 216–220
Complementation property, 281
Completely blind signatures, 112–113
Complete set of residues, 242
Complexity-theoretic approach, stream ciphers, 415–418
complexity of problems, 239–241
Compression, 226
Compression function, 431
Compression permutation, 273–274
Compromise, 5
Computational complexity, 237
Computationally secure, 8
Computer algorithms, 17
Computer clock, as random-sequence generator, 424
Computer Security Act of 1987, 600–601
Computing, with encrypted data, 85–86, 540–541
Conditional Access for Europe, 606–607
Conference key distribution, 524
Congruent, 242
Connection integer, 403
feedback with carry shift registers, maximal-period, 406–407
Continued fraction algorithm, 256
Contract signing, simultaneous:
with an arbitrator, 118
without an arbitrator
Control Vector, 180
Convertible undeniable signatures, 538–539
Coppersmith, Don, 94, 266, 280, 283, 293, 398, 457
Coppersmith's algorithm, 263
Correlation attack, 380
Correlation immunity, stream ciphers, 380
Correlations, random-sequence generators, 425
Counting coincidences, 14
Credit cards, anonymous, 147
Crepeau, Claude, 555
Crypt(1), 414
CRYPT(3), 296
differential, see Differential cryptanalysis
IDEA, 323
LOKI91, 316
Madryga, 306
related-key, 290
Snefru, 432
Cryptanalysts, 1
Crypt Breakers Workbench, 414
Cryptographers, 1
Cryptographic algorithm, see Cipher
Cryptographically secure pseudo-random, 45
Cryptographic facility, 562
Cryptographic mode, 189
Cryptographic protection, databases, 73–74
Cryptographic protocol, 22
Cryptography, 1
CRYPTO-LEGGO, 414
Cryptologists, 1
Cryptology, 1
CRYPTO-MECCANO, 346
Cryptosystems, 4
fair, 97
finite automaton public-key, 482
weak, 97
Cusick, Thomas, 312
Cut and choose, 103
Cypherpunks, 609
Daemen, Joan, 325, 341, 349, 414
Damgard, Ivan, 446
Damm, Arvid Gerhard, 13
Data, encrypted:
computing with, 85–86, 540–541
discrete logarithm problem, 540–541
Databases, cryptographic protection, 73–74
Data complexity, 9
Data Encryption Algorithm, see Data Encryption Standard
Data Encryption Standard, 17, 265–301
algorithm, brute-force attack efficiency, 152–153
commercial chips, 279
compression permutation, 273–274
CRYPT(3), 296
decryption, 277
description, 270
DESX, 295
differential cryptanalysis, 284–290
DES variants, 298
expansion permutation, 273–275
final permutation, 277
hardware and software implementation, 278–279
with independent suhkeys, 295
initial permutation, 271
iterated block cipher, 347
P-boxes
design criteria, 294
related-key cryptanalysis, 290
S-boxes, 349
design criteria, 294
number of rounds, 284
speeds on microprocessors and computers, 279
validation and certification of equipment, 268
Data Exchange Key, 581
Data Keys, 176
Davies, Donald, 562
Davies-Meyer, 448
abreast, 452
parallel, 451
Davies-Price, 358
Decoherence, 165
Decryption, 1
DES, 277
key, 3
key-error detection, 179
knapsack algorithms, 465
with a public key, 39
with symrnetric algorithm, 4
Denning-Sacco protocol, 63
Dense, 378
Derived sequence attack, 381
Designated confirmer signatures, 82–83, 539–540
Desmedt, Yvo, 81
DES, see Data Encryption Standard
Destruction:
DESX, 295
Dictionary attack, 52, 171–173
Differential cryptanalysis, 284–290
attacks against
DES variants, 298
Lucifer, 303
extending to higher-order differentials, 293
strength against, block cipher design theory, 348–349
Differential-linear cryptanalysis, 293
Diffie, Whitfield, 31, 37, 122, 216, 283, 419, 461, 501, 565
Diffie-Hellman:
extended, 515
Hughes variant, 515
key exchange without exchanging keys, 515
patents, 516
with three or more parties, 514
Diffie's randomized stream cipher, 419
Digital card, properties, 146
anonymous, 139
credit cards, 147
money orders, 140
double spending problem, 140–141
off-line systems, 146
perfect crime, 145
practical, 145
Digital certified mail, 122–123
Digital Notary System, 78
Digital Signature Algorithm, 17, 483–494
attacks against k, 492
computation time comparison with RSA, 489
dangers of common modulus, 493
ElGamal encryption with, 490–491
proposal for NIST standard, 483–486
RSA encryption with, 491
speed precomputations, 487–488
subliminal channel, 493, 534–536
foiling, 536
algorithms, 39
applications, 41
convertible undeniable signatures, 538–539
converting identification schemes to, 512
definition, 39
designated confirmer signatures, 82–83, 539–540
entrusted undeniable, 82
fail-stop, 85
Fiat-Shamir signature scheme, 507–508
Guillou-Quisquater signature scheme, 509–510
improved arbitrated solution, 76
key exchange with, 50
Guillou-Quisquater, 510
nonrepudiation, 40
oblivious, 117
protocol, 40
proxy, 83
public-key algorithms, 483–502
cellular automata, 500
Digital Signature Algorithm, see Digital Signature Algorithm
discrete logarithm signature schemes, 496–498
GOST digital signature algorithm, 495–496
Matsumoto-Imai algorithm, 500
public-key cryptography, 37–38
one-way hash functions and, 38–39
resend attack, foiling, 43
Schnorr signature scheme, 511–512
subliminal-free, 80
with symmetric cryptosystems and arbitrator, 35–37
terminology, 39
timestamps, 38
trees, 37
Dining Cryptographers Problem, 137
Discrete logarithm, 245
zero-knowledge proofs, 548
Discrete Logarithm Problem, 501, 540–541
Discrete logarithm signature schemes, 496–498
Distributed Authentication Security Service, 62
Distributed convertible undeniable signatures, 539
Distributed key management, 187
DNRSG, 387
DoD key generation, 175
Double spending problem, 140–141
Driver-level encryption, 222–223
DSA, see Digital Signature Algorithm
Dynamic random-sequence generator, 387
E-box, 273
ECB, see Electronic codebook mode
Electronic checks, 146
Electronic codebook mode, 189–191, 208–210
combined with OFB, 364
Electronic coins, 146
Electronic Frontier Foundation, 608
Electronic-funds transfer, DES adoption, 268
Electronic Privacy Information Center, 608
EKE implementation, 519
encryption, 478
patents, 479
ElGamal, Taher, 263
Elliptic curve cryptosystems, 480–481
Elliptic curve method, 256
Ellison, Carl, 362
Encoding, 226
Encrypt-decrypt-encrypt mode, 359
Encrypted Key Exchange:
implementation with
ElGamal, 519
RSA, 519
strengthening, 520
Encryption, 1
communication channels, 216–220
combining link-by-link and end-to-end, 219–221
with compression and error control, 226
digital signatures with, 41–44
driver-level versus file-level, 222–223
ElGamal, 478
key, 3
knapsack algorithms, 464
multiple, 357
with a private key, 39
RSA, 468
with DSA, 491
with symmetric algorithm, 4
using public key, 5
End-to-end encryption, 217–220
combined with link-by-link, 219–221
Entrusted undeniable signature, 82
Error detection:
during decryption, 179
during transmission, 178
Error extension, cipher block chaining mode, 196
Error propagation:
cipher block chaining mode, 195–196
output-feedback mode, 204
Escrow agencies, 592
Escrowed Encryption Standard, 97, 593
Euclid's algorithm, 245
Euler totient function, 248–249
Expansion permutation, 273–275, 315
Export:
of algorithms, 215–216, 610–616
foreign, 617
Exportable Protection Device, 389
Export Administration Act, 610
EXPTIME, 241
Extended Euclidean algorithm, 246–248
general number field sieve, 159–160
long-range predictions, 162
public-key encryption algorithms, 158–159
special number field sieve, 160–161
using quadratic sieve, 159
Factoring Problem, 501
Failsafe:
key escrowing, 98
Fail-stop digital signatures, 85
Fair cryptosystems, 97
Fait-Shamir, 508
FAPKCO, 482
FAPKC1, 482
FAPKC2, 482
patents, 311
Feedback:
cipher block chaining mode, 193, 195
internal, output-feedback mode, 203
Feedback function, 373
Feedback shift register, 373
Feedback with carry shift registers, 402–404
combining generators, 405, 410
maximal-length, tap sequences, 408–409
maximal-period, connection integers, 406–407
Feedforward, cipher block chaining mode, 195
identification scheme, 504–505
Feistel network, 347
Blowfish, 337
practically secure, 349
Fermat's little theorem, 248
Euler's generalization, 248
FFT-Hash, 446
Fiat-Shamir signature scheme, 507–508
Fibonacci configuration, 373, 379
Fibonacci shrinking generator, 391
File-level encryption, 222–223
Filter generator, 381
Finite field, 254
FIPS PUB 46, 267
FIPS PUB 74, 267
FIPS PUB 81, 267
FIPS PUB 112, 267
Fish, 391
Fixed bit index, 543
Flat keyspace, 176
Flipping coins, see Coin flipping
Fortified key negotiation, 522
Galois configuration, linear feedback shift registers, 378–379
Galois field, computing in, 254–255
Garey, Michael, 241
Gatekeeper, 278
General number field sieve, 159–160, 256
General Services Administration, DES adoption, 268
Gifford, David, 392
Gill, J., 501
Global deduction, 8
Gollmann, Dieter, 386
Goodman-McAuley cryptosystem, 466
Goresky, Mark, 404
GOST digital signature algorithm, 495–496
GOST hash function, 454
GOST R 34.10–94, 495
Gosudarstvennyi Standard Soyuza SSR, 331–334
Graham-Shamir knapsacks, 465
Greatest common divisor, 245–246
Grossman, Edna, 266
Group Special Mobile, 389
Group structure, block ciphers design theory, 348
GSM, 389
Guillou-Quisquater:
identification scheme, 508–510
Gutmann, Peter, 353
Guy, Richard, 159
Hard drive, encrypted, providing random access to, 222
Hardware:
RSA, 469
Hash functions, see One-way hash functions
Hash value, 30
Hellman, Martin, 31–32, 37, 262, 283, 293, 358–359, 461–462
Hiding infonnation from an oracle, 86
Historical terms, 9
Homophonic substitution cipher, 10–11
Hughes, 515
Hughes, Eric, 609
Hybrid cryptosystems, 32–34, 461
IBC-Hash, 458
IBM Common Cryptographic Architecture, 573–574
IBM secret-key management protocol, 561–562
cryptanalysis, 323
patents, 325
S-boxes, 349
strength against differential cryptanalysis, 348
variants, 325
Ideal secrecy, 236
Identification schemes:
converting to signature schemes, 512
Ohta-Okamoto, 508
Schnorr authentication and signature scheme, 510–512
Identity-based cryptosystems, 115
Ignition key, 564
Import, foreign, 617
Index of coincidence, 14
Information:
amount, information theory definition, 233
deduction, 8
Information-theoretic approach, 418
stream ciphers, 415
cryptosystem security, 234–235
entropy and uncertainty, 233–234
rate of the language, 234
Ingemarsson, Ingemar, 418
Initialization vector:
cipher block chaining mode, 194
cipher-feedback mode, 201
output-feedback mode, 204
Insertion attack, synchronous stream ciphers, 203
Instance deduction, 8
Institute of Electrical and Electronics Engineers, 608
Integrated Services Digital Network, 563–565
Integrity, 2
Interactive protocol, 103
Interchange Key, 581
Interlock protocol, mutual authentication using, 54–55
Internal feedback, 203
International Association for Cryptologic Research, 605
International Standards Organization:
authentication framework, 574–577
DES adoption, 268
International Traffic in Arms Regulations, 610–614
Internet, Privacy-Enhanced Mail, 577–584
Introducers, 187
Inverses modulo a number, 246–248
IPES, 319
ISO 8732, 359
ISO/IEC 9979, 607
Iterated block cipher, 347
J-algebras, 501
Jam, 414
Johnson, David, 241
Jueneman's methods, 457
Kaliski, Burt, 342
Karn, Phil, 351
Karnin-Greene-Hellman, 530
abbreviations, 567
authentication steps, 567
credentials, 568
getting initial ticket, 569
getting server tickets, 569–570
licenses, 571
model, 566
requesting services, 570
security, 571
Version 5 messages, 568
Kerckhoffs, A., 5
Kerckhoffs's assumption, 7
Key, 3
CDMF shortening, 366
controlling usage, 180
distribution in large networks, 177
ANSI X9.17 standard, 175
DoD, 175
transmission, error detection, 178
updating, 180
weak
block ciphers design theory, 348
Key and message broadcast, 51–52
Key and message transmission, 51
Key Auto-Key, 202
Keyboard latency, as random-sequence generator, 424–425
Key Certification Authority, 43
Key control vectors, 562
Key distribution:
conference, 524
Key Distribution Center, 43–44
Key escrow, 97–100, 181–182, 591
DASS, 62
Denning-Sacco protocol, 63
with digital signatures, 50
Kerberos, 60
key and message broadcast, 51–52
key and message transmission, 51
man-in-the-middle attack, 48–49
Needham-Schroeder protocol, 58–59
Neuman-Stubblebine protocol, 60–62
protocols, formal analysis, 65–68
with public-key cryptography, 48
with symmetric cryptography, 47–48
Wide-Mouth Frog protocol, 56–57
without exchanging keys, 515
Key-exchange algorithms:
conference key distribution and secret broadcasting, 523–525
Encrypted Key Exchange, 518–522
fortified key negotiation, 522
Shamir's three-pass protocol, 516–517
station-to-station protocol, 516
Tatebayashi-Matsuzaki-Newman, 524–525
Key generation, using coin flipping, 92
Key length:
comparing symmetric and public-key, 165–166
biotechnology as cryptanalysis tool, 156–157
neural networks, 155
software-based brute-force attacks, 154–155
thermodynamic limitations on brute-force attacks, 157–158
using viruses to spread cracking program, 155–156
distributed, 187
Key negotiation, fortified, 522
Key notarization, 562
Key revocation certificate, 585
Keyspace, 3
flat, 176
counter mode, 206
periodic, 202
Kilian, Joe, 116
Kinetic Protection Device, 389–390
Klapper, Andy, 404
decryption, 465
encryption, 464
implementations, 465
patents, 466
public key created from private key, 464
security, 465
Knapsack problem, 501
Known-plaintext attack, 6–7, 151, 359
Knudsen, Lars, 8, 293, 314, 316, 348–349
Koblitz, Neal, 480
Kravitz, David, 493
Kravitz-Reed, 481
Lagged Fibonacci generators, 390
LaGrange interpolating polynomial scheme, 528–529
Langford, Susan, 293
Law Enforcement Access Field, 591
Legal issues, 618
Legendre symbol, 251
Lehmann, 259
Lehmann algorithm, 259
Length, shift register, 373
Lenstra, Arjen, 159, 162, 257, 485, 488
LFSR/FCSR summation/parity cascade, 410–411
Lidl, Rudolph, 481
Linear complexity:
profile, 380
stream ciphers, 380
Linear congruential generators, 369–372
constants, 370
Linear consistency test, 381
Linear cryptanalysis:
strength against, block cipher design theory, 348–349
Linear error-correcting codes, algorithms based on, 480
Linear feedback shift registers, 372–379
primitive polynomials mod 2, 376–377
stream ciphers using, see Stream ciphers
Linear syndrome algorithm, 381
Link-by-link encryption, 216–218
combined with end-to-end, 219–221
Linking protocol, timestamping, 76–77
Li-Wang algorithm, 346
Local deduction, 8
Lock-in, 388
Logarithms, discrete, see Discrete logarithm
S-boxes, 349
LOKI Double-Block, 451
Low decryption exponent attack, RSA, 473
Low encryption exponent attack, RSA, 472–473
Luby, Michael, 352
xDES1, 365
LUC, 481
Lucas number, 481
Luccio-Mazzone, 501
Lu-Lee cryptosystem, 466
Lyndon words, 501
MacGuffin, 346
Madryga, W. E., 304
Mafia Fraud, 110
Magic numbers, 423
Man-in-the-middle attack, 48–49
Masks, REDOC II, 312
Massey, James, 319, 339, 386, 418, 449
Master Key, 561
Master Terminal Key, 561
Matsumoto-Imai algorithm, 500
Mauborgne, Joseph, 15
Maurer, Ueli, 419
Maurer's randomized stream cipher, 419
Maximal period generator, 369
MEAL, 344
McEliece, Robert, 479
McEliece algorithm, 346, 479–480
MD2, 441
MD3, 446
MD-strengthening, 431
Meet-in-the-middle attack, 358, 381
Merkle, Ralph, 34, 316–318, 358–359, 432, 455, 461–462
Merkle's puzzles, 34
Merritt, Michael, 67, 518, 520–521, 571
Message:
authentication, 56
broadcasting, 69
Privacy-Enhanced Mail, 579–582
Message authentication codes, 31, 455–459
bidirectional, 457
CBC-MAC, 456
IBC-Hash, 458
Jueneman's methods, 457
message authenticator algorithm, 456–457
one-way hash functions as, 458–459
stream ciphers, 459
Message authenticator algorithm, 456–457
Message broadcast, anonymous, 137–139
Message Digest Cipher, 353
Message Integrity Check, 578
Message-meaning rule, 66
Message Security Protocol, 584
Meyer, Joseph A., 614
Meyer-Schilling, 452
Micali, Silvio, 94, 508, 546–547, 552
Miller, Gary, 259
Miller, V. S., 480
Mimic functions, 10
Minimum-disclosure proofs, 108
Miyaguchi, Shoji, 308
m*n-bit S box, 349
Modular Multiplication-based Block cipher, 325–327
Modular reduction, 242
Monoalphabetic cipher, 10
Montgomery's method, 244
Moore's Law, 153
m-sequence, 374
MSP, 584
Muller, Winfried, 481
Multiparty unconditionally secure protocols, 137
Multiple-bit generator, 421
Multiple encryption, 357
quintuple, 366
Multiple Identity Fraud, 111
Multiple-key public-key cryptography, 527–528
Multiplier, 369
Multispeed inner-product generator, 386–387
Mush, 392
Mutual shrinking generator, 392
Mykotronx Clipper chip, 328
Nanoteq, 390
National Bureau of Standards, see National Institute of Standards and Technology
National Computer Security Center, 599–600
National Institute of Standards and Technology, 600–603
Memorandum of Understanding, 601–603
National Security Agency, 597–599
export of cryptography, 614–615
Memorandum of Understanding, 601–603
S-box development role, 278, 280
Navy Research Laboratory, protocol analyzer, 67–68
Needham-Schroeder protocol, 58–59
Networks, large, key distribution, 177
Neuman-Stubblebine protocol, 60–62
Neural networks, breaking algorithms, 155
Niederreiter, Harald, 501
Niederreiter algorithm, 480
Niemi cryptosystem, 466
Nobauer, Wilfried, 481
Noise, random, using as random-sequence generator, 423–424
Nonce-verification rule, 66
Non-Interactive Key Sharing systems, 115
Nonlinear-feedback shift registers, 412–413
Nonrepudiation, 2
Notz, Bill, 266
graph isomorphism, 104
knapsack algorithms, 462
McEliece algorithm, 479
NSDD-145, 268
Nuclear Non-Proliferation Act, 610
Number field sieve, 256
Numbers:
2-adic, 404
Barrett's algorithm, 244
Blum integers, 253
Chinese remainder theorem, 249–250
Euclid's algorithm, 245
Euler totient function, 248–249
extended Euclidean algorithm, 246–248
Fermat's little theorem, 248
Galois field, computing in, 254–255
greatest common divisor, 245–246
inverses modulo a number, 246–248
Legendre symbol, 251
Montgomery's method, 244
prime numbers, 245
solving for coefficients, 248
Nyberg, Kaisa, 348
Oblivious transfer, 116–117, 550
Oblivous signatures, 117
OFB, see Output-feedback mode
Ohta-Okamoto identification scheme, 508
1/p generator, 414
hiding ciphertext in ciphertext, 227–228
One-time tape, 418
One-way accumulators, 95–96, 543
authentication using, 52
coin flipping using, 90
trap-door, 158
One-way hash functions, 30–31, 351–354
birthday attacks, 165–166, 430
choosing, 455
compression function, 431
encryption speeds, 456
improved arbitrated solution, 76
MD2, 441
MD3, 446
MD-strengthening, 431
message authentication codes, 455–459
Message Digest Cipher, 353–354
multiple signatures, 40
RIPE-MD, 445
Secure Hash Algorithm, 442–445
Snefru, 432
as unbiased random-bit generator, 107
using public-key algorithms, 455
using symmetric block algorithms, 446–455
AR hash function, 453
GOST hash function, 454
hash length equals block size, 447–449
LOKI Double-Block, 451
modified Davies-Meyer, 449–450
parallel Davies-Meyer, 451
Preneel-Bosselaers-Govaerts-Vandewalle, 450
Quisquater-Girault, 450
tandem and abreast Davies-Meyer, 451–452
Ong-Schnorr-Shamir, 498–499, 531–532
Outerbridge, Richard, 363
Outer-CBC, 360
Output-feedback mode, 203–205, 208–210
combined with ECB, 364
DES, 277
with a nonlinear function, 208
Overtake, 598
Overwriting, 229
Padding:
cipher block chaining mode, 195
electronic codebook mode, 190–191
MD5, 436
Secure Hash Algorithm, 442
triple encryption with, 362
Painvin, Georges, 12
Passive attack, 27
Passive cheaters, 27
Patents, 609–610; See also specific algorithms
P-boxes:
design criteria, 294
PEM, see Privacy-Enhanced Mail
Perfect secrecy, 235
Period, 11
shift register, 373
Permutation, 237
Plaintext block chaining mode, 208
Plaintext feedback mode, 208
Plaintext pair, right and wrong pairs, 287
p-NEW scheme, 498
Pohlig, Stephen, 262
Pohlig-Hellman encryption scheme, 474
Polarized photons, 555
Pollard's Monte Carlo algorithm, 256
Polyalphabetic substitution cipher, 10–11
Polygram substitution cipher, 10–11
Polynomials:
degree, shift register length, 374
dense, 378
sparse, 378
Pomerance, Carl, 257
Powerline System, 466
Pre-image, 30
Preneel, Bart, 457
Preneel-Bosselaers-Govaerts-Vandewalle, 450
Price, William, 562
Prime numbers, 245
practical considerations, 260–260
relatively prime, 245
strong, 261
Primitive, 253
Principal square root, 251
Privacy-Enhanced Mail, 577–584
certificates, 579
documents, 578
TIS/PEM, 583
Private key, 5
creating public key from, 464
for public-key cryptography, lifetime, 184
Probabilistic encryption, 552–554
Problems:
EXPTIME, 241
hard, 239
intractable, 239
PSPACE, 241
tractable, 239
undecidable, 240
See also NP-complete problem
Processing complexity, 9
Product cipher, 347
Proofs of Membership, 111
Propagating cipher block chaining mode, 207
Proposed Encryption Standard, 319
all-or-nothing disclosure of secrets, 96
anonymous message broadcast, 137–139
attacks against, 27
authentication and key-exchange, formal analysis, 65–68
characteristics, 21
cryptographic, 22
DASS, 62
definition, 21
Denning-Sacco, 63
digital cash, see Digital cash
digital certified mail, 122–123
digital signatures, 40
distributed, timestamping, 77–78
IBM Common Cryptographic Architecture, 573–574
IBM secret-key management, 561–562
identity-based public-key cryptography, 115
interactive, 103
multiparty unconditionally secure, 137
Needham-Schroeder, 58
oblivious signatures, 117
secure circuit evaluation, 137
secure elections, see Secure elections
secure multiparty computation, 134–137
SESAME, 572
simultaneous contract signing, 118–122
simultaneous exchange of secrets, 123–124
types, 24
See also Authentication; Zero-knowledge proofs
Pseudo-Hadamard Transform, 340
Pseudo-random function family, SEAL, 398–399
Pseudo-random-number generator, 78, 416
Pseudo-random-sequence generator, 44
bit commitment using, 88
generating multiple streams, 420–421
linear congruential generators, 369–372
linear feedback shift registers, 372–379
PSPACE, 241
Public key, 5
creating from private key, 464
Public-key algorithms, 4–5, 33, 500–502
based on linear error-correcting codes, 480
Diffie-Hellman, 513
elliptic curve cryptosystems, 480–481
finite automaton cryptosystems, 482
LUC, 481
one-way hash functions using, 455
Pohlig-Hellman, 474
RSA, see RSA
strength, 502
Public-key cryptography:
identity-based, 115
key exchange with, 48
private keys, lifetime, 184
versus symmetric cryptography, 216–217
Public-Key Cryptography Standards, 588–589
Public-key ring, 585
Purchase-key attack, 7
Quadratic nonresidues, 251
generator, 417
Quadratic sieve, 256
factoring, 159
Quintuple encryption, 366
Quisquater, Jean-Jacques, 102, 508
Quisquater-Girault, 450
Rabin, Michael, 103, 259, 518, 550
Rabin-Miller algorithm, 259–260
RACE Integrity Primitives Evaluation, 605–606
Rackoff, Charles, 352
Rainbow Books, 600
Rambutan, 390
Random noise, as random-sequence generator, 423–424
Random-number generation, 44
Random-sequence generators, 421–428
biases and correlations, 425–426
computer clock, 424
distilling randomness, 426–428
keyboard latency measurement, 424–425
Randomized approach, stream ciphers, 415
Randomized stream cipher, 419
Randomness, distilling, 426–428
Rao-Nam algorithm, 346
Rate of the language, 234
Receipt, resending message as, 42–43
REDOC III, 313
Redundancy, of language, 234
Reeds, Jim, 369
Related-key cryptanalysis, 290
Renji, Tao, 482
Renting Passports, 111
Research and Development in Advanced Communication Technologies, Integrity Primitives Evaluation, 605–606
Resend attack, foiling, 43
Residue, 242
reduced set, 248
Restricted algorithms, 3
RFC 1421, 578
RFC 1422, 578
RFC 1423, 578
RFC 1424, 578
Richter, Manfield, 423
RIPE-MD, 445
Rip van Winkle cipher, 418–419
Rivest, Ron, 159, 163, 318–319, 344, 397, 435, 440–441, 444, 446, 467
Rivest Cipher, 318
Robshaw, Matt, 342
Rogaway, Phil, 398
ROM key, 181
ROT13, 11
ability to break, zero-knowledge proofs, 548–549
attack on encrypting and signing with, 473–474
blind signatures, 548
chosen ciphertext attack, 471–472
common modulus attack, 472
compared to DSA, 485
computation time comparison with DSA, 489
EKE implementation, 519
encryption, 468
with DSA, 491
in hardware, 469
low decryption exponent attack, 473
low encryption exponent attack, 472–473
patents, 474
restrictions on use, 473
speed, 469
standards, 474
RSA Data Security, Inc., 295, 603–604
RSA Factoring Challenge, 257
RSA generator, 417
Rubber-hose cryptanalysis, 7
Running-key cipher, 12
SAFER K-128, 341
S-boxes:
Blowfish, 336
Boolean functions in, 350
design
criteria, 294
security questions, 284
Lucifer, 303
Scherbius, Arthur, 13
Schlafly, Roger, 394
Schnorr authentication and signature scheme, 510–512
Schwartau, Winn, 300
Scott, Robert, 306
Secrecy:
ideal, 236
perfect, 235
Secrets, simultaneous exchange, 123–124
without adjudication, 72
with cheaters, 72
with disenrollment, 73
without revealing shares, 73
schemes with prevention, 73
verifiable, 73
Secret-sharing algorithms, 528–531
advanced threshold schemes, 530–531
cheater detection, 531
Karnin-Greene-Hellman, 530
LaGrange interpolating polynomial scheme, 528–529
vector scheme, 529
Secure and Fast Encryption Routine, 339
Secure circuit evaluation, 137
divided protocols, 133
multiple-key ciphers, 133
simplistic voting protocols, 125–126
voting with
single central facility, 128–130
two central facilities, 127–128
voting without central tabulating facility, 130–133
Secure European System for Applications in a Multi-vendor Environment, 572
Secure Hash Algorithm, 442–445
Secure multiparty computation, 134–137, 551–552
Secure Telephone Unit, 565
Security:
Blowfish, 339
cipher block chaining mode, 196–197
ciphers based on one-way hash functions, 353–354
ESIGN, 500
Kerberos, 571
knapsack algorithms, 465
output-feedback mode, 205
PKZIP, 395
Privacy-Enhanced Mail, 582–583
requirements for different information, 167
SEAL, 400
Secure Hash Algorithm, 444–445
self-synchronizing stream cipher, 199
Selector string, 143
Self-decimated generator, 385–387
Self-enforcing protocols, 26–27
Self-recovering, cipher block chaining mode, 196
Self-shrinking generator, 388
Self-synchronizing stream cipher, 198–199
Selmer, E. S., 381
SESAME, 572
Shamir, Adi, 72, 284–285, 288, 291, 296, 303, 311–312, 314, 319, 416, 434, 462, 467, 502–504, 508, 516, 528
Shamir's pseudo-random-number generator, 416
Shamir's three-pass protocol, 516–517
Shimizu, Akihiro, 308
Shor, Peter, 164
Shrinking generator, 388, 411–412
Signature equation, 496
Signatures, see Digital signatures
Silverman, Bob, 159
Simmons, Gustavus, 72, 79, 493, 501, 531
Simple columnar transposition cipher, 12
Simple substitution cipher, 10–11
Simultaneous exchange of secrets, 123–124
Skew, 425
SKEY, 53
Smart cards, 587
observer, 146
Universal Electronic Payment System, 589–591
Smith, Lynn, 266
Snefru, 432
Software:
encryption, 225
linear feedback shift registers, 378–379
Software-based brute-force attack, 154–155
Software Publishers Association, 608
Solovay, Robert, 259
Solovay-Strassen algorithm, 259
Space complexity, 237
Sparse, 378
Special number field sieve, 160–161
SP network, 347
Square roots:
modulo n, 258
Standards:
public-key cryptography, 588–589
RSA, 474
Station-to-station protocol, 516
StepRightUp, 414
Stereotyped beginnings, 190
Stereotyped endings, 190
Storage:
requirements, 9
Stornetta, W. Scott, 75
Straight permutation, 275
Strassen, Volker, 259
Stream algorithms, 4
Stream ciphers, 4, 189, 197–198
A5, 389
Blum, Blum, and Shub generator, 417–418
Blum-Micali generator, 416–417
cellular automaton generator, 414
choosing, 420
complexity-theoretic approach, 415–418
correlation immunity, 380
counter mode, 206
crypt(1), 414
Diffie's randomized stream cipher, 419
encryption speeds, 420
feedback with carry shift registers, 402–404
Fish, 391
information-theoretic approach, 418
linear complexity, 380
Maurer's randomized stream cipher, 419
message authentication codes, 459
multiple, generating from single pseudo-random-sequence generator, 420–421
Mush, 392
Nanoteq, 390
nonlinear-feedback shift registers, 412–413
1/p generator, 414
output-feedback mode, 205
Rambutan, 390
random-sequence generators, 421–428
Rip van Winkle cipher, 418–419
RSA generator, 417
system-theoretic approach, 415–416
using feedback with carry shift registers, 405–412
alternating stop-and-go generators, 410–411
cascade generators, 405
FCSR combining generators, 405, 410
LFSR/FCSR summation/parity cascade, 410–411
using linear feedback shift registers, 381–388
alternating stop-and-go generator, 383, 385
Beth-Piper stop-and-go generator, 383–384
bilateral stop-and-go generator, 384–385
DNRSG, 387
Geffe generator, 382
generalized Geffe generator, 382–383
multispeed inner-product generator, 386–387
self-decimated generator, 385–387
self-shrinking generator, 388
shrinking generator, 388
Strict avalanche criteria, 350
Strong primes, 261
Subkey, 272
IDEA, 322
independent, DES, 295
applications, 80
foiling, 536
signature algorithm, 79
Subliminal-free signature schemes, 80
Subprotocols, 26
Substitution-permutation network, 347
SubStream, 414
Superincreasing knapsack, 463–464
Superincreasing sequence, 463–464
Suppress-replay, 61
Surety Technologies, 79
SXAL8, 344
Symmetric algorithms, 4
Symmetric block algorithms, one-way hash functions using, 446–455
Symmetric cryptography:
versus public-key cryptography, 216–217
Symmetric cryptosystems, document signing, 35–37
Synchronous stream cipher, 202–203
System-theoretic approach, stream ciphers, 415–416
Tap sequence, 373
feedback with carry shift registers, maximal-length, 408–409
Tatebayashi-Matsuzaki-Newman, 524–525
Tavares, Stafford, 334
TEA, 346
TEMPEST, 224
Terrorist Fraud, 110
Thermodynarnics, limitations on brute-force attacks, 157–158
Three-pass protocol, Shamir's, 516–517
Three-Satisfiability, 242
Three-Way Marriage Problenr, 242
Threshold schemes, 71–72, 530–531
Ticket-Granting Service, 567
Ticket Granting Ticket, 569
Tickets, 568
Time complexity, 237
Timestamping, 75
digital signatures, 38
improved arbitrated solution, 76
TIS/PEM, 583
Total break, 8
Traffic analysis, 219
Traffic-flow security, 217
Transposition, 237
ciphers, 12
Trapdoor one-way function, 30
Traveling Salesman Problem, 241–242
Trees, digital signatures, 37
Trial division, 256
encrypt-decrypt-encrypt mode, 359
with minimum key, 360
with three keys, 360
Tsujii-Kurosawa-Itoh-Fujioka-Matsumoto, 501
Tuchman, Walt, 266, 278, 280, 294, 303, 358
Tuckerman, Bryant, 266
Turing, Alan, 240
2–adic numbers, 404
Uncertainty, 234
Unconditional sender and recipient untraceability, 138
Undeniable digital signatures, 81–82, 536–539
Unit key, 591
United States, export rules, 610–616
Universal Electronic Payment System, 589–591
Unpredictable, to left and to right, 417
Updating, keys, 180
Utah Digital Signature Act, 618
van Oorschot, Paul, 359
Vector scheme, 529
Verification block, 179
Verification equation, 496
Vernam, Gilbert, 15
Vino, 346
Viruses, to spread cracking program, 155–156
VLSI 6868, 278
Voting, see Secure elections
Wayner, Peter, 10
Weak keys:
block ciphers design theory, 348
Wheeler, David, 400
Wide-Mouth Frog protocol, 56–57
Wiener, Michael, 153, 284, 359
Word Auto Key Encryption, 400
Work factor, 9
Yagisawa algorithm, 501
Yao's millionaire problem, 551
Yung, Moti, 81
Yuval, Gideon, 430
Zero-knowledge proofs, 101–109, 548–549
Chess Grandmaster Problem, 109
computational, 108
discrete logarithm, 548
Mafia Fraud, 110
minimum-disclosure, 108
Multiple Identity Fraud, 111
n is Blum integer, 549
no-use, 108
parallel, 106
perfect, 108
Proofs of Membership, 111
Renting Passports, 111
statistical, 108
Terrorist Fraud, 110
Zero-knowledge protocol:
Zierler, Neal, 381
Zimmermann, Philip, 584