This preview shows page 1. Sign up to view the full content.
Unformatted text preview: roken, but I am not optimistic. Another variant is [294]. While a variation of the knapsack algorithm is currently secure—the ChorRivest knapsack [356], despite a “specialized attack” [743]—the amount of computation required makes it far less useful than the other algorithms discussed here. A variant, called the Powerline System, is not secure [958]. Most important, considering the ease with which all the other variations fell, it doesn’t seem prudent to trust them. Previous Table of Contents Next Products  Contact Us  About Us  Privacy  Ad Info  Home Use of this site is subject to certain Terms & Conditions, Copyright © 19962000 EarthWeb Inc. All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is prohibited. Read EarthWeb's privacy statement. To access the contents, click the chapter and section titles. Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C (cloth)
Go!
Keyword
Brief Full Advanced Search Search Tips (Publisher: John Wiley & Sons, Inc.) Author(s): Bruce Schneier ISBN: 0471128457 Publication Date: 01/01/96 Search this book:
Go! Previous Table of Contents Next
 Patents
The original MerkleHellman algorithm is patented in the United States [720] and worldwide (see Table 19.1). Public Key Partners (PKP) licenses the patent, along with other publickey cryptography patents (see Section 25.5). The U.S. patent will expire on August 19, 1997. 19.3 RSA
Soon after Merkle’s knapsack algorithm came the first fullfledged publickey algorithm, one that works for encryption and digital signatures: RSA [1328, 1329]. Of all the publickey algorithms proposed over the years, RSA is by far the easiest to understand and implement. (Martin Gardner published an early description of the algorithm in his “Mathematical Games” column in Scientific American [599].) It is also the most popular. Named after the three inventors—Ron Rivest, Adi Shamir, an...
View Full
Document
 Fall '10
 ALIULGER
 Cryptography

Click to edit the document details