Loading…
“Do-it-yourself” cryptography
New data communications services such as electronic data interchange, which allows companies to contract for goods and services by electronic mail, will bring increasing need for cryptographic privacy transformations that are unique to a group of participants. Participation of outsiders in supplying...
Saved in:
Published in: | Computers & security 1990-11, Vol.9 (7), p.613-619 |
---|---|
Main Author: | |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | New data communications services such as electronic data interchange, which allows companies to contract for goods and services by electronic mail, will bring increasing need for cryptographic privacy transformations that are unique to a group of participants. Participation of outsiders in supplying hardware or algorithms, or distributing keys may be regarded as unacceptable intrusion. This paper describes two ciphers: a block cipher, CRYPTO-MECCANO; and a stream cipher, CRYPTO-LEGGO. They exist in software and use so many keys that each implementation is a distinct cipher system. Tests suggest either one can provide stronger protection than the Data Encryption Standard (DES).
CRYPTO-MECCANO has been submitted to the European RIPE/RACE Consortium as a candidate algorithm to replace DES as a cryptographic primitive for integrity assurance. |
---|---|
ISSN: | 0167-4048 1872-6208 |
DOI: | 10.1016/0167-4048(90)90060-7 |