Related Concepts
Cryptology (Classical); Shannon’s Model
Here the most often quoted cryptological security maxims are listed [1].
Maxim Number One: “One should not underrate the adversary.”
Della Porta’s maxim: Only a cryptanalyst, if anybody, can judge the security of a cryptosystem (Auguste Kerckhoffs, [5] formulating the knowledge of the sixteenth century cryptologist Giambattista Della Porta[6]). To this, David Kahn remarked: “Nearly every inventor of a cipher system has been convinced of the unsolvability of his brainchild.”
Kerckhoffs’ maxim: “No inconvenience should occur if the cryptosystem falls into the hands of the enemy” [5].
Givierge’s maxim: “Superficial complications can be illusory, for they can provide the cryptographer with a false sense of security” (Marcel Givierge, French cryptanalyst in WWI [2, 3]).
Rohrbach’s maxim: “In judging the encryption security of a class of methods, cryptographic faults and other infringements of security discipline are to be taken into...
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsRecommended Reading
Bauer FL (2002) Decrypted secrets. In: Methods and maxims of cryptology. Springer, Berlin
Givierge M (1925) Questions de Chiffre, Revue Militaire Française, vol 94 (June 1924), 398–417 (July 1924) 59–78, Paris
Givierge M (1925) Cours de Cryptographie. Berger-Levrault, Paris
Kahn, D (1967) The codebreakers. Macmillan, New York
Kerckhoffs (1883) Auguste, La Cryptographie militaire. Journal des Sciences Militaires, 9 (January) 5–38, (February) 161–191. Available on http://www.cl.ac.uk./usweatfapp2/kerckhoffs/
Porta, GD (1563) De Furtivis Literarum Notis. Naples
Rohrbach H (1939–1946) Mathematische und Maschinelle Methoden beim Chiffrieren und Dechiffrieren. FIAT Review of German Science, 1939–1946: Applied Mathematics, 3 (I):233–257, Wiesbaden: Office of Military Government for Germany, Field Information Agencies, 1948
Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:656–715
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Bauer, F.L. (2011). Maxims. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_171
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_171
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering