Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Martin E. Hellman is active.

Publication


Featured researches published by Martin E. Hellman.


IEEE Transactions on Information Theory | 1976

New Directions in Cryptography

Whitfield Diffie; Martin E. Hellman

Two kinds of contemporary developments in cryptography are examined. Widening applications of teleprocessing have given rise to a need for new types of cryptographic systems, which minimize the need for secure key distribution channels and supply the equivalent of a written signature. This paper suggests ways to solve these currently open problems. It also discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.


IEEE Transactions on Information Theory | 1978

The Gaussian wire-tap channel

Sik K. Leung-Yan-Cheong; Martin E. Hellman

Wyners results for discrete memoryless wire-tap channels are extended to the Gaussian wire-tap channel. It is shown that the secrecy capacity Cs is the difference between the capacities of the main and wire.tap channels. It is further shown that Rd= Cs is the upper boundary of the achievable rate-equivocation region.


IEEE Transactions on Information Theory | 1978

An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (Corresp.)

Stephen C. Pohlig; Martin E. Hellman

A cryptographic system is described which is secure if and only if computing logarithms over GF(p) is infeasible. Previously published algorithms for computing this function require O(p^{1/2}) complexity in both time and space. An improved algorithm is derived which requires O =(\log^{2} p) complexity if p - 1 has only small prime factors. Such values of p must be avoided in the cryptosystem. Constructive uses for the new algorithm are also described.


Proceedings of the IEEE | 1979

Privacy and authentication: An introduction to cryptography

Whitfield Diffie; Martin E. Hellman

This paper presents a tutorial introduction to contemporary cryptography. The basic information theoretic and computational properties of classical and modern cryptographic systems are presented, followed by cryptanalytic examination of several important systems and an examination of the application of cryptography to the security of timesharing systems and computer networks. The paper concludes with a guide to the cryptographic literature.


IEEE Transactions on Information Theory | 1980

A cryptanalytic time-memory trade-off

Martin E. Hellman

A probabilistic method is presented which cryptanalyzes any N key cryptosystem in N^{2/3} operational with N^{2/3} words of memory (average values) after a precomputation which requires N operations. If the precomputation can be performed in a reasonable time period (e.g, several years), the additional computation required to recover each key compares very favorably with the N operations required by an exhaustive search and the N words of memory required by table lookup. When applied to the Data Encryption Standard (DES) used in block mode, it indicates that solutions should cost between 1 and 100 each. The method works in a chosen plaintext attack and, if cipher block chaining is not used, can also be used in a ciphertext-only attack.


IEEE Computer | 1977

Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard

Whitfield Diffie; Martin E. Hellman

For centuries, cryptography has been a valuable asset of the military and diplomatic communities. Indeed, it is so valuable that its practice has usually been shrouded in secrecy and mystery.


IEEE Transactions on Information Theory | 1970

Probability of error, equivocation, and the Chernoff bound

Martin E. Hellman; Josef Raviv

Relationships between the probability of error, the equivocation, and the Chernoff bound are examined for the two-hypothesis decision problem. The effect of rejections on these bounds is derived. Finally, the results are extended to the case of any finite number of hypotheses.


IEEE Transactions on Communications | 1975

Bistable Behavior of ALOHA-Type Systems

Aydano B. Carleial; Martin E. Hellman

Packet switching has found widespread application in computer communications because of its ability to efficiently handle high ratios of peak-to-average data rate. Packet radio is the application of packet switching techniques to radio channels. The resultant multiple-access problem requires novel approaches. Such approaches have been developed by others and have primarily been analyzed in steady-state behavior. This paper demonstrates and analyzes an important aspect of the dynamic characteristics of packet radio, namely, that of bistable behavior. That is, the system possesses two statistically stable equilibrium points, one in a desirable low-delay region, and the other in an undesirable high-delay region. Since the stability is only statistical in nature, the system oscillates between these two points. Even if the resultant steady-state behavior is very poor, this dynamic analysis frequently shows that system performance will be acceptable. This is due to quiet periods (such as at night) which allow the system to recover.


national computer conference | 1976

Multiuser cryptographic techniques

Whitfield Diffie; Martin E. Hellman

This paper deals with new problems which arise in the application of cryptography to computer communication systems with large numbers of users. Foremost among these is the key distribution problem. We suggest two techniques for dealing with this problem. The first employs current technology and requires subversion of several separate key distribution nodes to compromise the systems security. Its disadvantage is a high overhead for single message connections. The second technique is still in the conceptual phase, but promises to eliminate completely the need for a secure key distribution channel, by making the senders keying information public. It is also shown how such a public key cryptosystem would allow the development of an authentication system which generates an unforgeable, message dependent digital signature.


Communications of The ACM | 1981

On the security of multiple encryption

Ralph C. Merkle; Martin E. Hellman

Double encryption has been suggested to strengthen the Federal Data Encryption Standard (DES). A recent proposal suggests that using two 56-bit keys but enciphering 3 times (encrypt with a first key, decrypt with a second key, then encrypt with the first key again) increases security over simple double encryption. This paper shows that although either technique significantly improves security over single encryption, the new technique does not significantly increase security over simple double encryption. Cryptanalysis of the 112-bit key requires about 256 operations and words of memory, using a chosen plaintext attack. While DES is used as an example, the technique is applicable to any similar cipher.

Collaboration


Dive into the Martin E. Hellman's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ronald L. Rivest

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge