Skip to main content

Technical approaches to Thwart computer fraud

  • Section 1 Introduction
  • Conference paper
  • First Online:
Computer Security and Industrial Cryptography

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 741))

  • 187 Accesses

Abstract

In our modern society the data protection and computer security needs can often best be met by classical and/or public key cryptographic techniques. The status and the methods of cryptographic research on algorithms, hardware and software is described, emphasizing on DES and RSA public key. The importance of the cryptographic protection of the future Integrated Broadband Communication Network (IBCN) is overviewed. The evolution of IT security techniques methods and standardization is discussed.

NFWO aspirant navorser, sponsored by the National Fund for Scientific Research (Belgium).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M.D. Abrams and H.D. Powell, “Tutorial computer and network security,” IEEE Computer Society Press, Los Angeles, 1987.

    Google Scholar 

  2. American National Standard for Financial Institution Message Authentication (Wholesale),” X9.9-1986 (Revised), ANSI, New York.

    Google Scholar 

  3. American National Standard for Financial Institution Key Management (Wholesale),” X9.17-1985, ANSI, New York.

    Google Scholar 

  4. I. Blake, P. van Oorschot, and S. Vanstone, “Complexity issues for public key cryptography,” in “Performance Limits in Communication Theory and Practice,” J.K. Skwirzynksi, Ed., Kluwer, 1988, pp. 75–97.

    Google Scholar 

  5. B. De Decker, “Unix security & Kerberos,” this volume.

    Google Scholar 

  6. D. Denning, “The clipper chip: a technical summary,” April 21, 1993.

    Google Scholar 

  7. Y. Desmedt, “What happened with knapsack cryptographic schemes?” in “Performance Limits in Communication Theory and Practice,” J.K. Skwirzynski, Ed., Kluwer, 1988, pp. 113–134.

    Google Scholar 

  8. W. Diffie, “The first ten years of public key cryptology,” in “Contemporary Cryptology: The Science of Information Integrity,” G.J. Simmons, Ed., IEEE Press, 1991, pp. 135–175.

    Google Scholar 

  9. W. Fumy and H.P. Rieß, “Kryptographie. Entwurf und Analyse symmetrischer Kryptosysteme,” Oldenburg, München, 1988.

    Google Scholar 

  10. B. Greenlee, “Requirements for key management protocols in the wholesale financial service industry,” IEEE Communications Magazine, Sept. 1985, pp. 22–28.

    Google Scholar 

  11. F. Hoornaert, M. Decroos, J. Vandewalle, and R. Govaerts, “Fast RSA-hardware: dream or reality ?,” Advances in Cryptology, Proc. Eurocrypt'88, LNCS 330, C.G. Günther, Ed., Springer-Verlag, 1988, pp. 257–264.

    Google Scholar 

  12. J. Horgan, “Thwarting information thieves,” IEEE Spectrum, July 1985, pp. 30–41.

    Google Scholar 

  13. J.L. Massey, “An introduction to contemporary cryptology,” in “Contemporary Cryptology: The Science of Information Integrity,” G.J. Simmons, Ed., IEEE Press, 1991, pp. 3–39.

    Google Scholar 

  14. D. Newman and R. Pickholtz, “Cryptography in the private sector,” IEEE Communications Magazine, Vol. 24, No. 8, August 1986, pp. 7–10.

    Google Scholar 

  15. D. Parker, “Fighting computer crime,” Ch. Scribner's Sons, New York, 1983.

    Google Scholar 

  16. D. Parker, “Seventeen information security myths debunked,” Proc. IFIP Workshop Finland, June 1990.

    Google Scholar 

  17. B. Preneel, “Standardization of cryptographic techniques,” this volume.

    Google Scholar 

  18. B. Preneel, R. Govaerts, and J. Vandewalle, “Information authentication: hash functions and digital signatures,” this volume.

    Google Scholar 

  19. K. Rihaczek, “Datensicherheit amerikanisch,” Datenschutz und Datensicherung, 1987, pp. 240–245.

    Google Scholar 

  20. Rihaczek K., “Ein Kompromiszvorschlag zur Datenverschüsselung,” Datenschutz und Datensicherung, 1987, pp. 299–303.

    Google Scholar 

  21. R.L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications ACM, Vol. 21, February 1978, pp. 120–126.

    Google Scholar 

  22. D.W. Roberts, “Evaluation criteria for IT security,” this volume.

    Google Scholar 

  23. R. Rosenberg, “Slamming the door on data thieves; Can the NSA create and enforce a new encryption standard ?” Electronics, Feb. 3, 1986, pp. 27–31.

    Google Scholar 

  24. G.J. Simmons, Ed., “Special section on cryptology,” pp. 515–518, pp. 533–627, Proc. IEEE, Vol. 6, No. 5, May 1988. (contains early versions of [8, 13, 26])

    Google Scholar 

  25. G.J. Simmons, Ed., “Contemporary Cryptology. The Science of Information Integrity,” IEEE Press, 1991.

    Google Scholar 

  26. M.E. Smid and D.K. Branstad, “The Data Encryption Standard: past and future,” in “Contemporary Cryptology: The Science of Information Integrity,” G.J. Simmons, Ed., IEEE Press, 1991, pp. 43–64.

    Google Scholar 

  27. J. Vandewalle, R. Govaerts, W. De Becker, M. Decroos, and G. Speybrouck, “Implementation study of public key cryptographic protection in an existing electronic mail and document handling system,” Advances in Cryptology, Proc. Eurocrypt'85, LNCS 219, F. Pilcher, Ed., Springer-Verlag, 1986, pp. 43–49.

    Google Scholar 

  28. J. Vandewalle and R. Govaerts, “Trends in data security,” Proc. Secubank '88, Secure Banking Information Systems, Datakontext-Verlag, Köln, 1988, pp. 32–38.

    Google Scholar 

  29. I. Verbauwhede, F. Hoornaert, J. Vandewalle, H. De Man, and R. Govaerts, “Security considerations in the design and implementation of a new DES chip,” Advances in Cryptology, Proc. Eurocrypt'87, LNCS 304, D. Chaum and W.L. Price, Eds., Springer-Verlag, 1988, pp. 287–300.

    Google Scholar 

  30. Trusted Computer Systems Evaluation Criteria,” DOD 5200.28 — STD, Department of Defense, United States of America, December 1985. (Orange book)

    Google Scholar 

  31. Information Technology Security Evaluation Criteria (ITSEC),” Provisional Harmonised Criteria, Version 1.2, June 1991, ISBN 92-826-3004-8, Catalogue number CD-71-91-502-EN-C.

    Google Scholar 

  32. Information Technology Security Evaluation Manual (ITSEM),” Version 0.2, April 1992.

    Google Scholar 

  33. OTR 200, Race Workplan,” Commission of the European Communities, 1988, Rue de la Loi 200, B-1049 Brussels, Belgium.

    Google Scholar 

  34. “The Security Industry in 2010,” Japan Computer Quarterly, 1990, pp. 3–17.

    Google Scholar 

  35. “Special report on data security,” IEEE Spectrum, Vol. 29, No. 9, August 1992, pp. 18–44.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Bart Preneel René Govaerts Joos Vandewalle

Rights and permissions

Reprints and permissions

Copyright information

© 1993 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Vandewalle, J., Govaerts, R., Preneel, B. (1993). Technical approaches to Thwart computer fraud. In: Preneel, B., Govaerts, R., Vandewalle, J. (eds) Computer Security and Industrial Cryptography. Lecture Notes in Computer Science, vol 741. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-57341-0_53

Download citation

  • DOI: https://doi.org/10.1007/3-540-57341-0_53

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-57341-8

  • Online ISBN: 978-3-540-48074-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics