Pirrho Musefili

Last updated

Pirrho Musefili (fl. 1546 - 1557) [1] was a Florentine cryptographer and cryptanalyst. [2] [3] He solved cyphers and cryptograms for clients, notable clients being the King of England, [4] King Henry II of France, the Duke of Alba, and the powerful of Denmark. [1]

Due to Musefili and his student (and called his successor) Camilo Giusti's wide area of service for cryptography, they have been noted as important for the expansion of cryptology outside of Italy. [1]

Related Research Articles

Kerberos is a computer-network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner. Its designers aimed it primarily at a client–server model, and it provides mutual authentication—both the user and the server verify each other's identity. Kerberos protocol messages are protected against eavesdropping and replay attacks.

Pretty Good Privacy (PGP) is an encryption program that provides cryptographic privacy and authentication for data communication. PGP is used for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partitions and to increase the security of e-mail communications. Phil Zimmermann developed PGP in 1991.

<span class="mw-page-title-main">Public-key cryptography</span> Cryptographic system with public and private keys

Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic algorithms based on mathematical problems termed one-way functions. Security of public-key cryptography depends on keeping the private key secret; the public key can be openly distributed without compromising security.

<span class="mw-page-title-main">Palatino</span> Serif typeface

Palatino is the name of an old-style serif typeface designed by Hermann Zapf, initially released in 1949 by the Stempel foundry and later by other companies, most notably the Mergenthaler Linotype Company.

In cryptography and computer security, a man-in-the-middle, monster-in-the-middle, machine-in-the-middle, meddler-in-the-middle, manipulator-in-the-middle (MITM), person-in-the-middle (PITM) or adversary-in-the-middle (AiTM) attack is a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other, as the attacker has inserted themselves between the two parties. One example of a MITM attack is active eavesdropping, in which the attacker makes independent connections with the victims and relays messages between them to make them believe they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. The attacker must be able to intercept all relevant messages passing between the two victims and inject new ones. This is straightforward in many circumstances; for example, an attacker within the reception range of an unencrypted Wi-Fi access point could insert themselves as a man-in-the-middle. As it aims to circumvent mutual authentication, a MITM attack can succeed only when the attacker impersonates each endpoint sufficiently well to satisfy their expectations. Most cryptographic protocols include some form of endpoint authentication specifically to prevent MITM attacks. For example, TLS can authenticate one or both parties using a mutually trusted certificate authority.

Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network. The protocol is widely used in applications such as email, instant messaging, and voice over IP, but its use in securing HTTPS remains the most publicly visible.

In computer security, challenge–response authentication is a family of protocols in which one party presents a question ("challenge") and another party must provide a valid answer ("response") to be authenticated.

An authentication protocol is a type of computer communications protocol or cryptographic protocol specifically designed for transfer of authentication data between two entities. It allows the receiving entity to authenticate the connecting entity as well as authenticate itself to the connecting entity by declaring the type of information needed for authentication as well as syntax. It is the most important layer of protection needed for secure communication within computer networks.

End-to-end encryption (E2EE) is a security method that keeps chats and messages secure. The end-to-end encryption is a system of communication where only the users communicating can read the messages. In principle, it prevents potential eavesdroppers – including telecom providers, Internet providers, malicious actors, and even the provider of the communication service – from being able to access the cryptographic keys needed to decrypt the conversation.

The Secure Remote Password protocol (SRP) is an augmented password-authenticated key exchange (PAKE) protocol, specifically designed to work around existing patents.

Data Protection Application Programming Interface (DPAPI) is a simple cryptographic application programming interface available as a built-in component in Windows 2000 and later versions of Microsoft Windows operating systems. In theory, the Data Protection API can enable symmetric encryption of any kind of data; in practice, its primary use in the Windows operating system is to perform symmetric encryption of asymmetric private keys, using a user or system secret as a significant contribution of entropy. A detailed analysis of DPAPI inner-workings was published in 2011 by Bursztein et al.

<span class="mw-page-title-main">Network Security Services</span> Collection of cryptographic computer libraries

Network Security Services (NSS) is a collection of cryptographic computer libraries designed to support cross-platform development of security-enabled client and server applications with optional support for hardware TLS/SSL acceleration on the server side and hardware smart cards on the client side. NSS provides a complete open-source implementation of cryptographic libraries supporting Transport Layer Security (TLS) / Secure Sockets Layer (SSL) and S/MIME. NSS releases prior to version 3.14 are tri-licensed under the Mozilla Public License 1.1, the GNU General Public License, and the GNU Lesser General Public License. Since release 3.14, NSS releases are licensed under GPL-compatible Mozilla Public License 2.0.

Security Support Provider Interface (SSPI) is a component of Windows API that performs security-related operations such as authentication.

<span class="mw-page-title-main">Cryptography</span> Practice and study of secure communication techniques

Cryptography, or cryptology, is the practice and study of techniques for secure communication in the presence of adversarial behavior. More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages. Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, information security, electrical engineering, digital signal processing, physics, and others. Core concepts related to information security are also central to cryptography. Practical applications of cryptography include electronic commerce, chip-based payment cards, digital currencies, computer passwords, and military communications.

<i>I, Hamlet</i> 1952 Italian film by Giorgio Simonelli

I, Hamlet is a 1952 Italian comedy film directed by Giorgio Simonelli and starring Erminio Macario, Franca Marzi and Rossana Podestà. A parody of William Shakespeare's tragedy Hamlet, its lack of commercial success led the newly formed production company Macario Film to a rapid bankruptcy.

<span class="mw-page-title-main">Bank secrecy</span> Agreement between a bank and its clients that activities remain private

Banking secrecy, alternately known as financial privacy, banking discretion, or bank safety, is a conditional agreement between a bank and its clients that all foregoing activities remain secure, confidential, and private. Most often associated with banking in Switzerland, banking secrecy is prevalent in Luxembourg, Monaco, Hong Kong, Singapore, Ireland, and Lebanon, among other off-shore banking institutions.

Autocrypt is a cryptographic protocol for email clients aiming to simplify key exchange and enabling encryption. Version 1.0 of the Autocrypt specification was released in December 2017 and makes no attempt to protect against MITM attacks. It is implemented on top of OpenPGP replacing its complex key management by fully automated unsecured exchange of cryptographic keys between peers.

<span class="mw-page-title-main">WebAuthn</span> Public-key authentication standard

Web Authentication (WebAuthn) is a web standard published by the World Wide Web Consortium (W3C). WebAuthn is a core component of the FIDO2 Project under the guidance of the FIDO Alliance. The goal of the project is to standardize an interface for authenticating users to web-based applications and services using public-key cryptography.

<span class="mw-page-title-main">Private set intersection</span>

Private set intersection is a secure multiparty computation cryptographic technique that allows two parties holding sets to compare encrypted versions of these sets in order to compute the intersection. In this scenario, neither party reveals anything to the counterparty except for the elements in the intersection.

<span class="mw-page-title-main">Stradivarius Palatinos</span> Set of five instruments by Antonio Stradivari

The Stradivarius Palatinos are a set of five string instruments made by Antonio Stradivari around 1700. They are kept in Madrid's Royal Palace. The term "Palatino" can in this case be translated as "court" instruments, as it refers to their belonging to the Spanish royal collection.

References

  1. 1 2 3 Khan, David (1996). The Codebreakers. Simon and Schuster. ISBN   9781439103555.
  2. Palatino, Giovanni Battista; S. Osley, A. (1986). On cryptography: the treatise Dalle cifre from Palatino's writing-book of 1540.
  3. Meister, Aloys (1902). Die anfänge der modern diplomatischen geheimschrift: Beiträge zur geschichte.
  4. "Steganography: its history and its application to computer based data files" (PDF).