M ASTER  S OFTWARE


QUALITY SOFTWARE SINCE 1958
 



ON THIS SITE


       The founder of Master Software Corporation is Dr. Frank Rubin, who has been involved with cryptography since 1957. He is the author of more than a dozen technical papers on cryptography (and several hobbyist articles that appeared in The Cryptogram). He has been an editor of Cryptologia, a journal devoted to cryptology published at the United States Military Academy, West Point NY. Several of Dr. Frank Rubin's cryptographic papers are available on this website.

THE QUADRATIC AND DOUBLE QUADRATIC RESIDUE CIPHERS
Quadratic Residue ciphers are compared to the RSA Public Key Cryptosystem
MESSAGE AUTHENTICATION USING QUADRATIC RESIDUES
Uses a new one-way hashing function based on quadratic residues
DESIGNING A HIGH-SECURITY CIPHER
A step by step approach to designing a strong stream cipher
A MULTIPLE-SIGNATURE PROTOCOL FOR PUBLIC-KEY CRYPTOSYSTEMS
Creates a digital signature that only the authorized signers could produce
ONE-TIME PAD CRYPTOGRAPHY
A practical way to achieve near-perfect security
Device, System and Method for Fast Secure Encryption of Bulk Data Files
Theory underlying the MX-Crypt matrix encryption patents (2007 manuscript)



BOOK


Secret Key Cryptography, Ciphers from simple to unbreakable. New York: Manning, 2022. This popular book is written for the general reader as well as engineers who implement cryptographic systems, and professional cryptologists.


TECHNICAL PAPERS


Here is a complete list of Dr. Rubin's cryptographic papers that have appeared in refereed journals.

Computer Methods for Decrypting Multiplex Ciphers. Cryptologia 2 (Apr. 1978), pp 152-160.

Computer Methods for Decrypting Random Stream Ciphers. Cryptologia 2 (July 1978), pp 215-231.

Decrypting a Stream Cipher Based on J-K Flip-flops. IEEE Trans. on Compu. 28 (July 1979), pp 483-487.
Reprinted in Cryptologia 5 (Jan. 1981), pp 51-57.

Solving a Cipher Based on Multiple Random Number Streams. Cryptologia 3 (July 1979), pp 155-157.

Cryptographic Aspects of Data Compression Codes. Cryptologia 3 (Oct. 1979), pp 202-205.

Foiling the Known-Plaintext Attack. Cryptologia 10 (Oct. 1986), pp 217-222.

Foiling an Exhaustive Key-Search Attack. Cryptologia 11 (Apr. 1987), pp 102-107.

The Cryptographic Uses of Post Tag Systems. Cryptologia 12 (Jan. 1988), pp 25-33.

Comments on "Cryptanalysis of Knapsack Ciphers Using Genetic Algorithms." Cryptologia 18 (Apr. 1994), pp 153-154.

The Quadratic and Double Quadratic Residue Ciphers. Cryptologia 19 (July 1995), pp 275-284.

Message Authentication Using Quadratic Residues. Cryptologia 19 (Oct. 1995), pp 397-404.

Designing a High-Security Cipher. Cryptologia 20 (July 1996), pp 247-257.

One-Time Pad Cryptography. Cryptologia 20 (Oct. 1996), pp 359-364.


ADDITIONAL REFERENCES


A Quick Overview of Cryptography   An easy introduction for anyone who is new to the subject.
Choosing an Encryption Product   Guidance for anyone looking to purchase, or develop, a cryptographic product.


Back to MASTER SOFTWARE CORPORATION homepage


Send email Send us an email for any comments or questions about
our cryptographic products.

© Copyright 2024 Master Software Corporation