Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP Posting-Version: version B 2.10.1 6/24/83 (MC830713); site hwcs.UUCP Path: utzoo!linus!vaxine!wjh12!genrad!decvax!mcnc!philabs!cmcl2!floyd!vax135!ukc!edcaad!hwcs!pjbk From: pjbk@hwcs.UUCP (Peter King) Newsgroups: net.lang.c Subject: Re: Cbenson's data encryption technique (plea for help) Message-ID: <111@hwcs.UUCP> Date: Wed, 13-Jun-84 05:45:04 EDT Article-I.D.: hwcs.111 Posted: Wed Jun 13 05:45:04 1984 Date-Received: Thu, 14-Jun-84 06:22:08 EDT References: <528@reed.UUCP>, <2347@brl-vgr.ARPA> <3921@utzoo.UUCP> Organization: Computer Sci., Heriot-Watt U., Scotland Lines: 13 Unicity distance and many other cryptographic terms and concepts are defined and discussed in the following books Denning, D.E. "Cryptography and Data Security" Addison-Wesley 1982 Konheim, A.G. "Cryptography: A Primer" Wiley 1981 Meyer, C.H. and Matyas, S.M. "Cryptography: a New Dimension in Computer Data Security" Wiley 1982 They are a starting point for any attempt to measure the 'strength' of any encryption technique. P.S. In the UK even the hardback version of David Kahn's "The Codebreakers" is an abridged version!