Skip to main content

Algorithms for Secure Communication

  • Chapter
  • First Online:
The Power of Algorithms

Abstract

The design of algorithms for sending confidential messages (i.e. messages that no one can read, except the intended receiver) goes back to the beginning of our civilization. However, before the widespread of modern computers, cryptography was practiced by few people: soldiers, or diplomats, or scientists fascinated by the problem of confidential communication. Cryptography algorithms designed in the past were ingenious transformations but were lacking a sound mathematical basis. Recently, the development of computers and of the Internet has opened up new applications of cryptography in business and society. To answer these needs, new algorithms have been developed that use sound mathematical techniques and have produced surprising results, which have opened up impressive possibilities that were considered unrealistic before. We will see examples of algorithms that use modular arithmetic (in which operations are performed modulo an integer) that are based on using functions that are easy to compute but difficult to invert.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 64.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    In particular, when buying a product on the World Wide Web and providing the payment information, the web protocol automatically changes from http to https. The https protocol is able to realize cryptographic encodings that are not possible with the http protocol, the one usually used for browsing the Web; the final letter of https means secure.

  2. 2.

    Specular writing is handwriting that is written from right to left (left-handed writing), and therefore can be only deciphered by means of a mirror.

  3. 3.

    The text must be long enough to meet the average frequencies of characters. In fact, it is not difficult to write short sentences in which the frequency is very different.

  4. 4.

    As an example, the probability of guessing a secret key of 40 decimal integers is smaller than the probability of having 130 consecutive heads while tossing a fair coin.

  5. 5.

    In fact, even though we do not have a formal proof of intractability, the problem is considered intractable.

  6. 6.

    The adversary who only listens to the communication is called a passive attacker and is the weakest possible adversary. An active adversary is one who is able to send messages on behalf of others and possibly intercept and modify messages posted by others. The method proposed by Diffie and Hellman is secure with respect to a passive adversary but it is not resilient with respect to an active attacker. We refer to [66, 78, 104] for how to cope with active adversaries.

  7. 7.

    Recall that e and (p − 1) ⋅ (q − 1) are relatively prime if the Greatest Common Divisor of e and [(p − 1) ⋅ (q − 1)] is 1.

  8. 8.

    Recall that f is a prime factor of n if 0 is the remainder of the division of n by f and f is different from 1 and n (in fact, we can also say that 1 and n are trivial factors).

  9. 9.

    The reason for including date and time in the next message will become clear shortly.

References

  1. Hinsley, F.H., Stripp, A. (eds.): Codebreakers: The Inside Story of Bletchley Park. Oxford University Press, New York (2001)

    Google Scholar 

  2. Kahn, D.: The Codebreakers. Macmillan, New York (1967)

    Google Scholar 

  3. Kaufman, C., Perlman, R., Speciner, M.: Network Security: Private Communication in a Public World. Prentice Hall, Upper Saddle River (2002)

    Google Scholar 

  4. Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC, Boca Raton (1996)

    Google Scholar 

  5. Singh, S.: The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. Doubleday, New York (1999)

    Google Scholar 

  6. Stallings, W.: Cryptography and Network Security. Prentice Hall, Upper Saddle River (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alberto Marchetti-Spaccamela .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Marchetti-Spaccamela, A. (2013). Algorithms for Secure Communication. In: Ausiello, G., Petreschi, R. (eds) The Power of Algorithms. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39652-6_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-39652-6_6

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-39651-9

  • Online ISBN: 978-3-642-39652-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics