Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP
Posting-Version: version B 2.10.1 6/24/83 (MC830713); site hwcs.UUCP
Path: utzoo!linus!vaxine!wjh12!genrad!decvax!mcnc!philabs!cmcl2!floyd!vax135!ukc!edcaad!hwcs!pjbk
From: pjbk@hwcs.UUCP (Peter King)
Newsgroups: net.lang.c
Subject: Re: Cbenson's data encryption technique (plea for help)
Message-ID: <111@hwcs.UUCP>
Date: Wed, 13-Jun-84 05:45:04 EDT
Article-I.D.: hwcs.111
Posted: Wed Jun 13 05:45:04 1984
Date-Received: Thu, 14-Jun-84 06:22:08 EDT
References: <528@reed.UUCP>, <2347@brl-vgr.ARPA> <3921@utzoo.UUCP>
Organization: Computer Sci., Heriot-Watt U., Scotland
Lines: 13

Unicity distance and many other cryptographic terms and concepts
are defined and discussed in the following books

Denning, D.E. "Cryptography and Data Security" Addison-Wesley 1982
Konheim, A.G. "Cryptography: A Primer" Wiley 1981
Meyer, C.H. and Matyas, S.M.
	"Cryptography: a New Dimension in Computer Data Security" Wiley 1982

They are a starting point for any attempt to measure the 'strength' of
any encryption technique.

P.S. In the UK even the hardback version of David Kahn's "The Codebreakers"
is an abridged version!