Abstract
In our modern society the data protection and computer security needs can often best be met by classical and/or public key cryptographic techniques. The status and the methods of cryptographic research on algorithms, hardware and software is described, emphasizing on DES and RSA public key. The importance of the cryptographic protection of the future Integrated Broadband Communication Network (IBCN) is overviewed. The evolution of IT security techniques methods and standardization is discussed.
NFWO aspirant navorser, sponsored by the National Fund for Scientific Research (Belgium).
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
M.D. Abrams and H.D. Powell, “Tutorial computer and network security,” IEEE Computer Society Press, Los Angeles, 1987.
“American National Standard for Financial Institution Message Authentication (Wholesale),” X9.9-1986 (Revised), ANSI, New York.
“American National Standard for Financial Institution Key Management (Wholesale),” X9.17-1985, ANSI, New York.
I. Blake, P. van Oorschot, and S. Vanstone, “Complexity issues for public key cryptography,” in “Performance Limits in Communication Theory and Practice,” J.K. Skwirzynksi, Ed., Kluwer, 1988, pp. 75–97.
B. De Decker, “Unix security & Kerberos,” this volume.
D. Denning, “The clipper chip: a technical summary,” April 21, 1993.
Y. Desmedt, “What happened with knapsack cryptographic schemes?” in “Performance Limits in Communication Theory and Practice,” J.K. Skwirzynski, Ed., Kluwer, 1988, pp. 113–134.
W. Diffie, “The first ten years of public key cryptology,” in “Contemporary Cryptology: The Science of Information Integrity,” G.J. Simmons, Ed., IEEE Press, 1991, pp. 135–175.
W. Fumy and H.P. Rieß, “Kryptographie. Entwurf und Analyse symmetrischer Kryptosysteme,” Oldenburg, München, 1988.
B. Greenlee, “Requirements for key management protocols in the wholesale financial service industry,” IEEE Communications Magazine, Sept. 1985, pp. 22–28.
F. Hoornaert, M. Decroos, J. Vandewalle, and R. Govaerts, “Fast RSA-hardware: dream or reality ?,” Advances in Cryptology, Proc. Eurocrypt'88, LNCS 330, C.G. Günther, Ed., Springer-Verlag, 1988, pp. 257–264.
J. Horgan, “Thwarting information thieves,” IEEE Spectrum, July 1985, pp. 30–41.
J.L. Massey, “An introduction to contemporary cryptology,” in “Contemporary Cryptology: The Science of Information Integrity,” G.J. Simmons, Ed., IEEE Press, 1991, pp. 3–39.
D. Newman and R. Pickholtz, “Cryptography in the private sector,” IEEE Communications Magazine, Vol. 24, No. 8, August 1986, pp. 7–10.
D. Parker, “Fighting computer crime,” Ch. Scribner's Sons, New York, 1983.
D. Parker, “Seventeen information security myths debunked,” Proc. IFIP Workshop Finland, June 1990.
B. Preneel, “Standardization of cryptographic techniques,” this volume.
B. Preneel, R. Govaerts, and J. Vandewalle, “Information authentication: hash functions and digital signatures,” this volume.
K. Rihaczek, “Datensicherheit amerikanisch,” Datenschutz und Datensicherung, 1987, pp. 240–245.
Rihaczek K., “Ein Kompromiszvorschlag zur Datenverschüsselung,” Datenschutz und Datensicherung, 1987, pp. 299–303.
R.L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications ACM, Vol. 21, February 1978, pp. 120–126.
D.W. Roberts, “Evaluation criteria for IT security,” this volume.
R. Rosenberg, “Slamming the door on data thieves; Can the NSA create and enforce a new encryption standard ?” Electronics, Feb. 3, 1986, pp. 27–31.
G.J. Simmons, Ed., “Special section on cryptology,” pp. 515–518, pp. 533–627, Proc. IEEE, Vol. 6, No. 5, May 1988. (contains early versions of [8, 13, 26])
G.J. Simmons, Ed., “Contemporary Cryptology. The Science of Information Integrity,” IEEE Press, 1991.
M.E. Smid and D.K. Branstad, “The Data Encryption Standard: past and future,” in “Contemporary Cryptology: The Science of Information Integrity,” G.J. Simmons, Ed., IEEE Press, 1991, pp. 43–64.
J. Vandewalle, R. Govaerts, W. De Becker, M. Decroos, and G. Speybrouck, “Implementation study of public key cryptographic protection in an existing electronic mail and document handling system,” Advances in Cryptology, Proc. Eurocrypt'85, LNCS 219, F. Pilcher, Ed., Springer-Verlag, 1986, pp. 43–49.
J. Vandewalle and R. Govaerts, “Trends in data security,” Proc. Secubank '88, Secure Banking Information Systems, Datakontext-Verlag, Köln, 1988, pp. 32–38.
I. Verbauwhede, F. Hoornaert, J. Vandewalle, H. De Man, and R. Govaerts, “Security considerations in the design and implementation of a new DES chip,” Advances in Cryptology, Proc. Eurocrypt'87, LNCS 304, D. Chaum and W.L. Price, Eds., Springer-Verlag, 1988, pp. 287–300.
“Trusted Computer Systems Evaluation Criteria,” DOD 5200.28 — STD, Department of Defense, United States of America, December 1985. (Orange book)
“Information Technology Security Evaluation Criteria (ITSEC),” Provisional Harmonised Criteria, Version 1.2, June 1991, ISBN 92-826-3004-8, Catalogue number CD-71-91-502-EN-C.
“Information Technology Security Evaluation Manual (ITSEM),” Version 0.2, April 1992.
“OTR 200, Race Workplan,” Commission of the European Communities, 1988, Rue de la Loi 200, B-1049 Brussels, Belgium.
“The Security Industry in 2010,” Japan Computer Quarterly, 1990, pp. 3–17.
“Special report on data security,” IEEE Spectrum, Vol. 29, No. 9, August 1992, pp. 18–44.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1993 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Vandewalle, J., Govaerts, R., Preneel, B. (1993). Technical approaches to Thwart computer fraud. In: Preneel, B., Govaerts, R., Vandewalle, J. (eds) Computer Security and Industrial Cryptography. Lecture Notes in Computer Science, vol 741. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-57341-0_53
Download citation
DOI: https://doi.org/10.1007/3-540-57341-0_53
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-57341-8
Online ISBN: 978-3-540-48074-7
eBook Packages: Springer Book Archive