381:
446:
451:
441:
142:, he was placed under house arrest, but gained US citizenship on 31 January 1944. The following day he was granted a security clearance and began work for the US
373:
Horst
Feistel, H, W. Notz, J. Lynn Smith. "Some cryptographic techniques for machine-to-machine data communications." IEEE Proceedings, 63(11), 1545–1554, 1975.
248:
238:
Both (Diffie and Landau, 1998), and (Levy, 2001) give
Feistel's birth year as 1914. The dates included here are based on the genealogical notes.
466:
481:
207:
151:
69:
471:
396:
143:
407:
476:
166:
255:
456:
188:(DES) ciphers. Feistel was one of the earliest non-government researchers to study the design and theory of
147:
436:
289:
185:
107:
169:. During his time there he received an award for his cryptographic work. In 1971, he patented the
368:
461:
411:
311:"Horst Feistel: the inventor of LUCIFER, the cryptographic algorithm that changed cryptology"
431:
426:
203:
8:
363:
272:
211:
155:
73:
330:
310:
351:
322:
181:
382:
Crypto: How the Code Rebels Beat the
Government—Saving Privacy in the Digital Age
196:
111:
199:
construction, a common method for constructing block ciphers (for example DES).
83:
400:
326:
420:
334:
135:
115:
95:
189:
173:
170:
139:
376:
222:. He married Leona (Gage) in 1945, with whom he had a daughter, Peggy.
162:
corporation. In 1968, Feistel became a
Research Staff Member at the
219:
215:
131:
99:
46:
106:, initiating research that culminated in the development of the
356:
Privacy on the Line: The
Politics of Wiretapping and Encryption
150:(IFF) devices until the 1950s. He was subsequently employed at
127:
42:
447:
Massachusetts
Institute of Technology School of Science alumni
159:
94:(January 30, 1915 – November 14, 1990) was a German-American
177:
163:
103:
110:(DES) in the 1970s. The structure used in DES, called a
361:
Horst
Feistel, "Cryptography and Computer Privacy."
452:
Harvard
Graduate School of Arts and Sciences alumni
442:Emigrants from Nazi Germany to the United States
418:
16:German-American cryptographer (1915 - 1990)
308:
419:
397:"Genealogical notes for Horst Feistel"
315:Journal of Cryptographic Engineering
304:
302:
144:Air Force Cambridge Research Center
13:
14:
493:
389:
299:
273:"On Generalized Feistel networks"
467:IBM Research computer scientists
408:In praise of the Feistel network
121:
282:
265:
241:
232:
180:led to the development of the
1:
482:MIT Lincoln Laboratory people
345:
195:Feistel lent his name to the
148:Identification Friend or Foe
98:who worked on the design of
7:
114:, is commonly used in many
10:
498:
472:German computer scientists
134:in 1915, and moved to the
367:, Vol. 228, No. 5, 1973.
327:10.1007/s13389-018-0198-5
309:Konheim, Alan G. (2019).
79:
65:
53:
28:
21:
477:Mitre Corporation people
225:
186:Data Encryption Standard
176:at IBM. His research at
108:Data Encryption Standard
354:, Susan Landau (1998).
457:Modern cryptographers
412:MIT Technology Review
369:(JPEG format scanned)
174:cryptographic system
126:Feistel was born in
364:Scientific American
202:Feistel obtained a
437:People from Berlin
290:"Feistel networks"
156:Lincoln Laboratory
74:Harvard University
204:bachelor's degree
167:T.J Watson Center
89:
88:
57:November 14, 1990
489:
404:
399:. Archived from
352:Whitfield Diffie
339:
338:
306:
297:
296:
294:
286:
280:
279:
277:
269:
263:
262:
260:
254:. Archived from
253:
245:
239:
236:
138:in 1934. During
60:
39:January 30, 1915
38:
36:
19:
18:
497:
496:
492:
491:
490:
488:
487:
486:
417:
416:
395:
392:
348:
343:
342:
307:
300:
292:
288:
287:
283:
275:
271:
270:
266:
258:
251:
249:"Block ciphers"
247:
246:
242:
237:
233:
228:
197:Feistel network
124:
112:Feistel network
72:
66:Alma mater
58:
49:
40:
34:
32:
24:
17:
12:
11:
5:
495:
485:
484:
479:
474:
469:
464:
459:
454:
449:
444:
439:
434:
429:
415:
414:
405:
403:on 2016-03-04.
391:
390:External links
388:
387:
386:
374:
371:
359:
347:
344:
341:
340:
298:
281:
264:
261:on 2011-11-25.
240:
230:
229:
227:
224:
123:
120:
87:
86:
84:Feistel cipher
81:
80:Known for
77:
76:
67:
63:
62:
61:(aged 75)
55:
51:
50:
41:
30:
26:
25:
22:
15:
9:
6:
4:
3:
2:
494:
483:
480:
478:
475:
473:
470:
468:
465:
463:
462:IBM employees
460:
458:
455:
453:
450:
448:
445:
443:
440:
438:
435:
433:
430:
428:
425:
424:
422:
413:
409:
406:
402:
398:
394:
393:
384:
383:
378:
375:
372:
370:
366:
365:
360:
357:
353:
350:
349:
336:
332:
328:
324:
321:(1): 85–100.
320:
316:
312:
305:
303:
291:
285:
274:
268:
257:
250:
244:
235:
231:
223:
221:
217:
213:
209:
205:
200:
198:
193:
191:
190:block ciphers
187:
183:
179:
175:
172:
168:
165:
161:
157:
153:
149:
145:
141:
137:
136:United States
133:
129:
122:Life and work
119:
117:
116:block ciphers
113:
109:
105:
101:
97:
96:cryptographer
93:
92:Horst Feistel
85:
82:
78:
75:
71:
68:
64:
56:
52:
48:
44:
31:
27:
23:Horst Feistel
20:
401:the original
380:
377:Levy, Steven
362:
355:
318:
314:
284:
267:
256:the original
243:
234:
201:
194:
171:block cipher
140:World War II
125:
91:
90:
59:(1990-11-14)
432:1990 deaths
427:1915 births
158:, then the
146:(AFCRC) on
421:Categories
346:References
218:, both in
210:, and his
35:1915-01-30
335:2190-8508
212:master's
385:, 2001.
220:physics
216:Harvard
182:Lucifer
132:Germany
100:ciphers
47:Germany
333:
128:Berlin
43:Berlin
293:(PDF)
276:(PDF)
259:(PDF)
252:(PDF)
226:Notes
160:MITRE
331:ISSN
184:and
54:Died
29:Born
323:doi
214:at
208:MIT
206:at
178:IBM
164:IBM
154:'s
152:MIT
104:IBM
102:at
70:MIT
423::
410:-
379:.
329:.
317:.
313:.
301:^
192:.
130:,
118:.
45:,
358:.
337:.
325::
319:9
295:.
278:.
37:)
33:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.