This preview shows page 1. Sign up to view the full content.
Unformatted text preview: roken, but I am not optimistic. Another variant is . While a variation of the knapsack algorithm is currently secure—the Chor-Rivest knapsack , despite a “specialized attack” —the amount of computation required makes it far less useful than the other algorithms discussed here. A variant, called the Powerline System, is not secure . Most important, considering the ease with which all the other variations fell, it doesn’t seem prudent to trust them. Previous Table of Contents Next Products | Contact Us | About Us | Privacy | Ad Info | Home Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc. All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is prohibited. Read EarthWeb's privacy statement. To access the contents, click the chapter and section titles. Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C (cloth)
Brief Full Advanced Search Search Tips (Publisher: John Wiley & Sons, Inc.) Author(s): Bruce Schneier ISBN: 0471128457 Publication Date: 01/01/96 Search this book:
Go! Previous Table of Contents Next
The original Merkle-Hellman algorithm is patented in the United States  and worldwide (see Table 19.1). Public Key Partners (PKP) licenses the patent, along with other public-key cryptography patents (see Section 25.5). The U.S. patent will expire on August 19, 1997. 19.3 RSA
Soon after Merkle’s knapsack algorithm came the first full-fledged public-key algorithm, one that works for encryption and digital signatures: RSA [1328, 1329]. Of all the public-key algorithms proposed over the years, RSA is by far the easiest to understand and implement. (Martin Gardner published an early description of the algorithm in his “Mathematical Games” column in Scientific American .) It is also the most popular. Named after the three inventors—Ron Rivest, Adi Shamir, an...
View Full Document
- Fall '10