A challenge - win the output of my work machine for 2 weeks

MadMerc

Senior member
Feb 27, 2000
396
0
0
Ok - im offering up the keys from my workmachine (p3 733 24/7) to the first person to answer the following questions correctly

1) Who first invented public key crptography?

2) When was DES officially adopted, and why was it limited to 56 bits?

3) What was the name of the encrytion system used by DES?#

4) Who are Alice and Bob?



finally - good luck
 

Jani

Senior member
Dec 24, 1999
405
0
0
1) Whitfield Diffie and Martin Hellman
2) 1976, NSA forced IBM to intentionally weaken the system down to 56 bits
3) Secret-key or symmetric-key cryptography
4) two parties (a=alice, b=bob) who communicate. Sender & receiver.
 

Dantoo

Golden Member
Dec 15, 1999
1,188
0
0
1) Whitfield Diffie and Martin Hellman and Ralph Merkle - (The earliest known origins of encryption systems were merely what people termed secret "codes". The first use of secret codes was probably by the sacred Jewish writers of ancient times. They used a secret code, called atbash, to write their manuscripts. It consisted of reversing the letters of their alphabet when writing.

Public key cryptography was invented in 1976 by Whitfield Diffie and Martin Hellman. For this reason, it is sometime called Diffie-Hellman encryption. It is also called asymmetric encryption because it uses two keys instead of one key (symmetric encryption).

and

In the late 70s, a pair of Stanford scientists (Merkle and Hellman) invented a better electronic lock-and- key system -- called public key cryptography-- and a trio of MIT scientists (Rivest, Shamir and Adelman) invented what is today the de facto standard public key algorithm -- RSA public key cryptography. The idea behind public key cryptography is that the single DES key is replaced by a key pair comprising a public key and a private key.)

and

Having the idea was one thing, finding a way to make it work was another. Diffie, Hellman and Merkle tried to come up with a viable method. In the end, they managed to find a method, known as Diffie-Hellman key agreement, for two people to agree on a shared, secret symmetric key using only public messages. It was nice, but it wasn't public-key encryption. The discovery of a true public-key encryption system was left to Ron Rivest, Adi Shamir and Leonard Adelman, who were working at MIT. Their system, named the RSA cryptosystem after them (with Rivest's name first because he was the person who finally made the breakthrough), was based on the difficulty of finding the divisors of large numbers (a process known as factoring).

2) 1976, NSA forced IBM to intentionally weaken the system down to 56 bits (DES utilizes a 64-bit key; however, 8 bits are for error detection thereby effectively making DES a 56-bit key system for security purposes. NSA ( National Security Agency ) whose primary function is to break security against US advised NBS in modifying the algorithm. The original proposal had key length of 112 bits. It was changed to 56. Some of the S-boxes were also modified.

NSA was suspected to have made changes to the algorithm to hold a trapdoor. There is another possible explanation - NSA made the changes to ensure that there were no trapdoors (inserted by IBM).

NSA may have expected that encryption will be implemented in hardware and that the algorithm will be secret. But the algorithm was made public in the standard. So they expected DES to be vulnerable to "Moore's Law".)

3) Key Escrow Systems - symmetric key encryption system 16-round Feistel cipher - (Feistel was one of the people who produced a more secure product cipher and implemented it in an encryption system called LUCIFER. Soon afterward a new algorithm was designed by IBM under the leadership of Dr W. L. Tuchman. This new algorithm used sixteen alternate steps of substitution and fixed permutations. All this was controlled by the key. This new algorithm was approved by the National Bureau of Standards on July 15th 1977. This new algorithm became known as the Data Encryption Standard.)


4) two parties (a=alice, b=bob) who communicate. Sender & receiver (Pictures of Alice and Bob)
 

Poof

Diamond Member
Jul 27, 2000
4,305
0
0
4) two parties (a=alice, b=bob) who communicate. Sender & receiver

What happened to Carol and Ted?


 

crYnOid

Senior member
Oct 11, 1999
457
0
76
I know what question is wrong..................... but I just don't know the right answer for that question
 

Jani

Senior member
Dec 24, 1999
405
0
0
OK. Now I know. Question 1 right answer is: The British Communications -- Electronics Security Group (CESG)
 

Dantoo

Golden Member
Dec 15, 1999
1,188
0
0
Hehe I read that last night too Jani. The claim is that J H Ellis did it first in his paper "The Possibility of Non-Secret Encryption by JH Ellis (1970)". If you keep searching there is also a claim the idea was first proposed in the U.S. under the Kennedy administration.

MM this is rather illuminating. Now I know what RSA stands for, I know DES is pronounced DEZ, but I'm not sure what you're gunning for?
 

Jarhead

Senior member
Oct 29, 1999
550
0
0
How about an Alice and Bill?

Alice Hill and Bill O'Brien from Computer Shoppers Hard Edge in ages past...

Anyone go back that far?
 

MadMerc

Senior member
Feb 27, 2000
396
0
0
Jani - thats the answer i was looking for

to my knowledge its the earliest proven invention of public key crpyto

also read here or "The Code Book" by Simon Singh, which is a fascinating read
 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |