Skip to main content Accessibility help
×
Hostname: page-component-77c89778f8-cnmwb Total loading time: 0 Render date: 2024-07-17T13:41:13.036Z Has data issue: false hasContentIssue false

Chapter 9 - Cryptology

Published online by Cambridge University Press:  05 June 2012

Rudolf Lidl
Affiliation:
University of Tasmania
Harald Niederreiter
Affiliation:
National University of Singapore
Get access

Summary

In this chapter we consider some aspects of cryptology that have received considerable attention over the last few years. Cryptology is concerned with the designing and the breaking of systems for the communication of secret information. Such systems are called cryptosystems or cipher systems or ciphers. The designing aspect is called cryptography, the breaking is referred to as cryptanalysis. The rapid development of computers, the electronic transmission of information, and the advent of electronic transfer of funds all contributed to the evolution of cryptology from a government monopoly that deals with military and diplomatic communications to a major concern of business. The concepts have changed from conventional (private-key) cryptosystems to public-key cryptosystems that provide privacy and authenticity in communication via transfer of messages. Cryptology as a science is in its infancy since it is still searching for appropriate criteria for security and measures of complexity of cryptosystems.

Conventional cryptosystems date back to the ancient Spartans and Romans. One elementary cipher, the Caesar cipher, was used by Julius Caesar and consists of a single key K = 3 such that a message M is transformed into M + 3 modulo 26, where the integers 0, 1, …, 25 represent the letters A, B, …, Z of the alphabet. An obvious generalization of this cipher leads to the substitution ciphers often named after de Vigenère, a French cryptographer of the 16th century.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 1994

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Cryptology
  • Rudolf Lidl, University of Tasmania, Harald Niederreiter, National University of Singapore
  • Book: Introduction to Finite Fields and their Applications
  • Online publication: 05 June 2012
  • Chapter DOI: https://doi.org/10.1017/CBO9781139172769.011
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • Cryptology
  • Rudolf Lidl, University of Tasmania, Harald Niederreiter, National University of Singapore
  • Book: Introduction to Finite Fields and their Applications
  • Online publication: 05 June 2012
  • Chapter DOI: https://doi.org/10.1017/CBO9781139172769.011
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • Cryptology
  • Rudolf Lidl, University of Tasmania, Harald Niederreiter, National University of Singapore
  • Book: Introduction to Finite Fields and their Applications
  • Online publication: 05 June 2012
  • Chapter DOI: https://doi.org/10.1017/CBO9781139172769.011
Available formats
×