Horst Feistel: the inventor of LUCIFER, the cryptographic algorithm that changed cryptology View Full Text


Ontology type: schema:ScholarlyArticle     


Article Info

DATE

2019-04

AUTHORS

Alan G. Konheim

ABSTRACT

This paper documents the early life of Horst Feistel, in particular, the events shaping his career. His creativity led to the development of today’s high-grade cryptographic algorithms. We describe Feistel’s successful escape from Nazi Germany, his university training in physics in Zürich and in Boston, and the career change to cryptography. Feistel became a Research Staff Member at the IBM Thomas J. Watson Research Center in Yorktown Heights, New York, in 1968. The cryptographic algorithm LUCIFER encrypts data to secure their contents. It embodies the ideas intrinsic in Feistel’s 1971 IBM patent. Claude Shannon’s 1949 prescription for achieving ideal secrecy was the basis for LUCIFER and its successors DES, 3DES and AES. DES authenticated transactions in the automated teller machine system developed by IBM as part of the Lloyds Bank Cashpoint System in England. Public key cryptography and advances in communication networks would provide a means to secure credit card transactions and lead to a lucrative environment for E-Commerce. The availability of high-grade encryption appears to have drastically limited the National Security Agency’s Signals Intelligence mission. The Department of Justice’s dispute with Apple’s iPhone is an attempt to restrict the commercial availability of high-grade encryption algorithms. It signals the struggle between privacy and national security. More... »

PAGES

1-16

References to SciGraph publications

  • 2016-04. Automated teller machines: their history and authentication protocols in JOURNAL OF CRYPTOGRAPHIC ENGINEERING
  • Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/s13389-018-0198-5

    DOI

    http://dx.doi.org/10.1007/s13389-018-0198-5

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1110065512


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Data Format", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "University of California, Santa Barbara", 
              "id": "https://www.grid.ac/institutes/grid.133342.4", 
              "name": [
                "Department of Computer Science, University of California, 93106, Santa Barbara, CA, USA"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Konheim", 
            "givenName": "Alan G.", 
            "id": "sg:person.010677412677.39", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010677412677.39"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "https://doi.org/10.1080/01611194.2015.1044816", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1000635559"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1002/j.1538-7305.1949.tb00928.x", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1009908265"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1002/j.1538-7305.1948.tb01338.x", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1052867467"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s13389-015-0104-3", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1053726639", 
              "https://doi.org/10.1007/s13389-015-0104-3"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/proc.1975.10005", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061442905"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1002/0470083980", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1098662372"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1002/0470083980", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1098662372"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2019-04", 
        "datePublishedReg": "2019-04-01", 
        "description": "This paper documents the early life of Horst Feistel, in particular, the events shaping his career. His creativity led to the development of today\u2019s high-grade cryptographic algorithms. We describe Feistel\u2019s successful escape from Nazi Germany, his university training in physics in Z\u00fcrich and in Boston, and the career change to cryptography. Feistel became a Research Staff Member at the IBM Thomas J. Watson Research Center in Yorktown Heights, New York, in 1968. The cryptographic algorithm LUCIFER encrypts data to secure their contents. It embodies the ideas intrinsic in Feistel\u2019s 1971 IBM patent. Claude Shannon\u2019s 1949 prescription for achieving ideal secrecy was the basis for LUCIFER and its successors DES, 3DES and AES. DES authenticated transactions in the automated teller machine system developed by IBM as part of the Lloyds Bank Cashpoint System in England. Public key cryptography and advances in communication networks would provide a means to secure credit card transactions and lead to a lucrative environment for E-Commerce. The availability of high-grade encryption appears to have drastically limited the National Security Agency\u2019s Signals Intelligence mission. The Department of Justice\u2019s dispute with Apple\u2019s iPhone is an attempt to restrict the commercial availability of high-grade encryption algorithms. It signals the struggle between privacy and national security.", 
        "genre": "research_article", 
        "id": "sg:pub.10.1007/s13389-018-0198-5", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": false, 
        "isPartOf": [
          {
            "id": "sg:journal.1136625", 
            "issn": [
              "2190-8508", 
              "2190-8516"
            ], 
            "name": "Journal of Cryptographic Engineering", 
            "type": "Periodical"
          }, 
          {
            "issueNumber": "1", 
            "type": "PublicationIssue"
          }, 
          {
            "type": "PublicationVolume", 
            "volumeNumber": "9"
          }
        ], 
        "name": "Horst Feistel: the inventor of LUCIFER, the cryptographic algorithm that changed cryptology", 
        "pagination": "1-16", 
        "productId": [
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "7da388655e6ff60e8f9a0193981e2fb07817da38c340ef72d7f21c7fc958e5b0"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/s13389-018-0198-5"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1110065512"
            ]
          }
        ], 
        "sameAs": [
          "https://doi.org/10.1007/s13389-018-0198-5", 
          "https://app.dimensions.ai/details/publication/pub.1110065512"
        ], 
        "sdDataset": "articles", 
        "sdDatePublished": "2019-04-11T14:16", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000372_0000000372/records_117088_00000003.jsonl", 
        "type": "ScholarlyArticle", 
        "url": "https://link.springer.com/10.1007%2Fs13389-018-0198-5"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s13389-018-0198-5'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s13389-018-0198-5'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s13389-018-0198-5'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s13389-018-0198-5'


     

    This table displays all metadata directly associated to this object as RDF triples.

    80 TRIPLES      21 PREDICATES      33 URIs      19 LITERALS      7 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/s13389-018-0198-5 schema:about anzsrc-for:08
    2 anzsrc-for:0804
    3 schema:author N404c5877c6ce436984820d26951425e5
    4 schema:citation sg:pub.10.1007/s13389-015-0104-3
    5 https://doi.org/10.1002/0470083980
    6 https://doi.org/10.1002/j.1538-7305.1948.tb01338.x
    7 https://doi.org/10.1002/j.1538-7305.1949.tb00928.x
    8 https://doi.org/10.1080/01611194.2015.1044816
    9 https://doi.org/10.1109/proc.1975.10005
    10 schema:datePublished 2019-04
    11 schema:datePublishedReg 2019-04-01
    12 schema:description This paper documents the early life of Horst Feistel, in particular, the events shaping his career. His creativity led to the development of today’s high-grade cryptographic algorithms. We describe Feistel’s successful escape from Nazi Germany, his university training in physics in Zürich and in Boston, and the career change to cryptography. Feistel became a Research Staff Member at the IBM Thomas J. Watson Research Center in Yorktown Heights, New York, in 1968. The cryptographic algorithm LUCIFER encrypts data to secure their contents. It embodies the ideas intrinsic in Feistel’s 1971 IBM patent. Claude Shannon’s 1949 prescription for achieving ideal secrecy was the basis for LUCIFER and its successors DES, 3DES and AES. DES authenticated transactions in the automated teller machine system developed by IBM as part of the Lloyds Bank Cashpoint System in England. Public key cryptography and advances in communication networks would provide a means to secure credit card transactions and lead to a lucrative environment for E-Commerce. The availability of high-grade encryption appears to have drastically limited the National Security Agency’s Signals Intelligence mission. The Department of Justice’s dispute with Apple’s iPhone is an attempt to restrict the commercial availability of high-grade encryption algorithms. It signals the struggle between privacy and national security.
    13 schema:genre research_article
    14 schema:inLanguage en
    15 schema:isAccessibleForFree false
    16 schema:isPartOf N0c2b403b01e24480ba3684e57f028a23
    17 N36753f0e535d45ee90d02e38004ae330
    18 sg:journal.1136625
    19 schema:name Horst Feistel: the inventor of LUCIFER, the cryptographic algorithm that changed cryptology
    20 schema:pagination 1-16
    21 schema:productId N2078706384a1463fb13584db991de7b6
    22 N9dbe9793a2284858b08e08865e532aa6
    23 Nd7b05b68f0fd4ac2834c8667a705fa1d
    24 schema:sameAs https://app.dimensions.ai/details/publication/pub.1110065512
    25 https://doi.org/10.1007/s13389-018-0198-5
    26 schema:sdDatePublished 2019-04-11T14:16
    27 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    28 schema:sdPublisher N6ea35d774f5b429b9e7fbb5940028a67
    29 schema:url https://link.springer.com/10.1007%2Fs13389-018-0198-5
    30 sgo:license sg:explorer/license/
    31 sgo:sdDataset articles
    32 rdf:type schema:ScholarlyArticle
    33 N0c2b403b01e24480ba3684e57f028a23 schema:issueNumber 1
    34 rdf:type schema:PublicationIssue
    35 N2078706384a1463fb13584db991de7b6 schema:name doi
    36 schema:value 10.1007/s13389-018-0198-5
    37 rdf:type schema:PropertyValue
    38 N36753f0e535d45ee90d02e38004ae330 schema:volumeNumber 9
    39 rdf:type schema:PublicationVolume
    40 N404c5877c6ce436984820d26951425e5 rdf:first sg:person.010677412677.39
    41 rdf:rest rdf:nil
    42 N6ea35d774f5b429b9e7fbb5940028a67 schema:name Springer Nature - SN SciGraph project
    43 rdf:type schema:Organization
    44 N9dbe9793a2284858b08e08865e532aa6 schema:name dimensions_id
    45 schema:value pub.1110065512
    46 rdf:type schema:PropertyValue
    47 Nd7b05b68f0fd4ac2834c8667a705fa1d schema:name readcube_id
    48 schema:value 7da388655e6ff60e8f9a0193981e2fb07817da38c340ef72d7f21c7fc958e5b0
    49 rdf:type schema:PropertyValue
    50 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    51 schema:name Information and Computing Sciences
    52 rdf:type schema:DefinedTerm
    53 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
    54 schema:name Data Format
    55 rdf:type schema:DefinedTerm
    56 sg:journal.1136625 schema:issn 2190-8508
    57 2190-8516
    58 schema:name Journal of Cryptographic Engineering
    59 rdf:type schema:Periodical
    60 sg:person.010677412677.39 schema:affiliation https://www.grid.ac/institutes/grid.133342.4
    61 schema:familyName Konheim
    62 schema:givenName Alan G.
    63 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010677412677.39
    64 rdf:type schema:Person
    65 sg:pub.10.1007/s13389-015-0104-3 schema:sameAs https://app.dimensions.ai/details/publication/pub.1053726639
    66 https://doi.org/10.1007/s13389-015-0104-3
    67 rdf:type schema:CreativeWork
    68 https://doi.org/10.1002/0470083980 schema:sameAs https://app.dimensions.ai/details/publication/pub.1098662372
    69 rdf:type schema:CreativeWork
    70 https://doi.org/10.1002/j.1538-7305.1948.tb01338.x schema:sameAs https://app.dimensions.ai/details/publication/pub.1052867467
    71 rdf:type schema:CreativeWork
    72 https://doi.org/10.1002/j.1538-7305.1949.tb00928.x schema:sameAs https://app.dimensions.ai/details/publication/pub.1009908265
    73 rdf:type schema:CreativeWork
    74 https://doi.org/10.1080/01611194.2015.1044816 schema:sameAs https://app.dimensions.ai/details/publication/pub.1000635559
    75 rdf:type schema:CreativeWork
    76 https://doi.org/10.1109/proc.1975.10005 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061442905
    77 rdf:type schema:CreativeWork
    78 https://www.grid.ac/institutes/grid.133342.4 schema:alternateName University of California, Santa Barbara
    79 schema:name Department of Computer Science, University of California, 93106, Santa Barbara, CA, USA
    80 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...