skip to main content
research-article
Free Access

Cybersecurity, nuclear security, alan turing, and illogical logic

Published:27 November 2017Publication History
Skip Abstract Section

Abstract

Cyber deterrence, like nuclear deterrence, depends on our adversaries being rational enough to be deterred by our threats but us not by theirs.

References

  1. Coppersmith, D. The Data Encryption Standard (DES) and its strength against attacks. IBM Journal of Research and Development 38, 3 (May 1994), 243--250. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Corrigan-Gibbs, H. Keeping secrets. Stanford Magazine (Nov./Dec. 2014), 58--64; http://tinyurl.com/cyptowar1, expanding to https://alumni.stanford.edu/get/page/magazine/article/?article_id=74801Google ScholarGoogle Scholar
  3. Diffie, W. and Hellman, M. Exhaustive cryptanalysis of the NBS data encryption standard. Computer 10, 6 (June 1977), 74--84; http://www-ee.stanford.edu/%7Ehellman/publications/27.pdf Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Diffie, W. and Hellman, M. New directions in cryptography. IEEE Transactions on Information Theory IT-22, 6 (Nov. 1976), 644--654; http://www-ee.stanford.edu/%7Ehellman/publications/24.pdf Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Ellis, J. The history of non-secret encryption. Cryptologia 23, 3 (1999), 267--273.Google ScholarGoogle ScholarCross RefCross Ref
  6. Graham, S. Letter to Ralph C. Merkle (Oct. 22, 1975); http://www.merkle.com/1974/RejectionLetter.pdfGoogle ScholarGoogle Scholar
  7. Hellman, D. and Hellman M. A New Map for Relationships: Creating True Love at Home & Peace on the Planet. New Map Publishing, Stanford, CA, 2016; http://tinyurl.com/HellmanBook, expanding to http://www-ee.stanford.edu/%7Ehellman/publications/book3.pdfGoogle ScholarGoogle Scholar
  8. Hellman, M., Merkle, R., Schroeppel, R., Washington, L., Diffie, W., Pohlig, S., and Schweitzer, P. Results of an Initial Attempt to Cryptanalyze the NBS Data Encryption Standard. Technical Report SEL 76--042 (available from NTIS). Electrical Engineering Department, Stanford University, Stanford, CA, Sept. 9, 1976 (revised Nov. 10, 1976); http://tinyurl.com/nbs-des-analysis, expanding to http://www-ee.stanford.edu/~hellman/resources/1976_sel_des_report.pdfGoogle ScholarGoogle Scholar
  9. Hellman, M. Risk analysis of nuclear deterrence. The Bent of Tau Beta Pi 99, 2 (Spring 2008), 14--22; http://tinyurl.com/hellman74, expanding to http://www-ee.stanford.edu/%7Ehellman/publications/74.pdfGoogle ScholarGoogle Scholar
  10. Hellman, M. How risky is nuclear optimism? Bulletin of the Atomic Scientists 67, 2 (Mar. 2011), 47--56; http://tinyurl.com/HowRisky, expanding to http://www-ee.stanford.edu/~hellman/publications/75.pdfGoogle ScholarGoogle ScholarCross RefCross Ref
  11. Lehmer, D. and Powers, R. On factoring large numbers. Bulletin of the American Mathematical Society 37, 10 (1931), 770--776.Google ScholarGoogle ScholarCross RefCross Ref
  12. Merkle, R. Secure communication over insecure channels. Commun. 21, 4 (Apr. 1978), 294--299. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Merkle, R. A digital signature based on a conventional encryption function. In Advances in Cryptology, CRYPTO 1987, Lecture Notes in Computer Science, Vol. 293 (Santa Barbara, CA, Aug. 16--20). Springer-Verlag, Berlin, Heidelberg, Germany, 1988, 369--378. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Meyer, J. Letter to IEEE (July 7, 1977); https://stacks.stanford.edu/file/druid:wg115cn5068/1977%200707%20Meyer%20letter.pdf and https://purl.stanford.edu/wg115cn5068Google ScholarGoogle Scholar
  15. Morrison, M. and Brillhart, J. A method of factoring and the factorization of F7. Mathematics of Computation 29, 129 (Jan. 1975), 183--205.Google ScholarGoogle Scholar
  16. Pomerance, C. A tale of two sieves. Notices of the AMS 43, 12 (Dec. 1996), 1473--1485.Google ScholarGoogle Scholar
  17. Rivest, R., Shamir, A., and Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 2 (Feb. 1978), 120--126. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Sanger, D. U.S. must step up capacity for cyberattacks, chief argues. The New York Times (Mar. 20, 2015), A4.Google ScholarGoogle Scholar
  19. Schwartz, J. Memo to Martin Hellman (Oct. 7, 1977); https://stacks.stanford.edu/file/druid:wg115cn5068/1977%201007%20Schwartz2MH.pdfGoogle ScholarGoogle Scholar
  20. Shor, P. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal on Computing 26, 5 (1997), 1484--1509. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Turing, A. On computable real numbers, with an application to the Entscheidungsproblem. Proceedings of the London Mathematical Society, Series 2 42 (1936), 230--265; https://www.cs.virginia.edu/~robins/Turing_Paper_1936.pdfGoogle ScholarGoogle Scholar

Index Terms

  1. Cybersecurity, nuclear security, alan turing, and illogical logic

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in

              Full Access

              • Published in

                cover image Communications of the ACM
                Communications of the ACM  Volume 60, Issue 12
                December 2017
                91 pages
                ISSN:0001-0782
                EISSN:1557-7317
                DOI:10.1145/3167461
                Issue’s Table of Contents

                Copyright © 2017 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 27 November 2017

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article
                • Popular
                • Refereed

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader

              HTML Format

              View this article in HTML Format .

              View HTML Format