Electronic Signature Functions

In this first part we examine all the conditions that must be satisfied by the electronic signature, and examine the mathematical consequences.

  • PDF / 21,199,538 Bytes
  • 333 Pages / 480.875 x 691.043 pts Page_size
  • 82 Downloads / 219 Views

DOWNLOAD

REPORT


SECURE

279

DIGITAL

COMMUNICATIONS

EDITED BY

G. LONGO UNIVERSITA' DI TRIESTE

SPRINGER-VERLAG WIEN GMBH

SCIENCES

This volume contains ll8 illustrations.

This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned specifically those of translation, reprinting, re-use of illustrations, broadcasting, reproduction by photocopying machine or similar means, and storage in data banks. © 1983 by Springer-Verlag Wien Originally published by Springer Verlag Wien-New York in 1983

ISBN 978-3-211-81784-1 DOI 10.1007/978-3-7091-2640-0

ISBN 978-3-7091-2640-0 (eBook)

PREFACE

The necessity of keeping certain information secret is as old as human communication. At the same time the advantages to be gained in intercepting secret messages was soon realized. This has led to a century-long battle between the "codemakers" and the "code breakers", the battle being fought in the everchanging arena of communication media. The concept of secure communication itself has evolved through the ages, as the traditional communication systems -like the mail and courier services - were supplemented by more technical media- radio, telephone, television, data links, etc. The amount of protection needed also vary depending both on the importance of the message contents and on the determination of the interceptor to understand and use the information. The most common forms of communication are highly insecure, since they are easily intercepted and understood. Probably the use of a courier is the safest way to exchange messages, but this is seldom possible in our present society, which is so much dependent on large amounts of information exchanged at very high rate. One possibility is then to make information (almost) non-interceptible by concealing the messages via a suitable transformation before transmission. A cipher system is precisely a more or less sophisticated way of doing this, and the "art" (some would prefer "science") of designing cipher systems is named cryptology (from two Greek words meaning "discourse on hiding"). It has to be emphasized that the revolution of microelectronics has led both to everincreasing capabilities of and to ever increasing dependence upon data processing and data transmission systems. This results in a tremendous growth of the need for protection against unauthorized access and misuse of the data. While the general public is increasingly alarmed by frauds in this area, professional cryptologists are well aware of the weaknesses of present-day security and of the difficulties of their task.

II

Preface

The aim of this book is to give a broad survey of the problem of secure communication. Some contributions are introductory, some are more advanced, but the interested reader can benefit from reading all of them as different chapters on one single topic of increasing importance. I wish to thank all the participants and all the lecturers, whose generous effort make it possible to publish this book.

Giuseppe Longo

Udine, November 1983.

CONTENTS

pa