,
Fred C. Piper

Fred C. Piper’s Followers (5)

member photo
member photo
member photo
member photo
member photo

Fred C. Piper


Website

Genre


Professor Fred Piper was appointed Professor of Mathematics at the University of London in 1975 and has worked in information security since 1979. In 1985, he formed a company, Codes & Ciphers Ltd, which offers consultancy advice in all aspects of information security. He has acted as a consultant to over 80 companies including a number of financial institutions and major industrial companies in the UK, Europe, Asia, Australia, South Africa and the USA.

The consultancy work has been varied and has included algorithm design and analysis, work on EFTPOS and ATM networks, data systems, security audits, risk analysis and the formulation of security policies. He has lectured worldwide on information security, both academically and commercially, h
...more

Average rating: 3.55 · 114 ratings · 11 reviews · 5 distinct worksSimilar authors
Cypher Systems

by
really liked it 4.00 avg rating — 2 ratings
Rate this book
Clear rating
Secure Smart Embedded Devic...

by
it was amazing 5.00 avg rating — 1 rating — published 2013 — 8 editions
Rate this book
Clear rating
Digital Signatures Security...

by
0.00 avg rating — 0 ratings — published 2000
Rate this book
Clear rating
Security and Privacy in Com...

by
0.00 avg rating — 0 ratings — published 2012
Rate this book
Clear rating

* Note: these are all the books on Goodreads for this author. To add more, click here.

Quotes by Fred C. Piper  (?)
Quotes are added by the Goodreads community and are not verified by Goodreads. (Learn more)

“In this simplistic example we have to admit that the sender has no way of knowing whose padlock is on the briefcase and that it might be possible for an adversary to impersonate the receiver and place their padlock on the briefcase. This is a problem that has to be addressed. The ‘Whose padlock is it?’ question in this briefcase example is similar to the ‘Whose public key is it?’ question that is so important when public key systems are used.”
Fred Piper, Cryptography: A Very Short Introduction

“Step 1: The sender places the present in the briefcase, which they lock with their padlock and remove their key. They then send the locked briefcase to the receiver. Note: While the briefcase is en route from sender to receiver, it is safe from all adversaries, because they cannot remove the padlock from the briefcase. However, the receiver is also unable to obtain the present. Step 2: The receiver locks the briefcase with their own padlock and removes the key. They then return it to the sender. Note: The briefcase is now locked with two padlocks so no one can get the present. Step 3: The sender uses their own key to remove their padlock from the briefcase and returns the briefcase to the receiver. Note: The only lock on the briefcase belongs to the receiver. Step 4: The receiver removes their padlock from the briefcase to obtain the present.”
Fred Piper, Cryptography: A Very Short Introduction



Is this you? Let us know. If not, help out and invite Fred to Goodreads.