{"id":1077,"date":"2020-02-15T16:38:54","date_gmt":"2020-02-16T00:38:54","guid":{"rendered":"http:\/\/cetinkoc.net\/blog\/?p=1077"},"modified":"2022-04-23T01:54:42","modified_gmt":"2022-04-23T08:54:42","slug":"horst-feistel","status":"publish","type":"post","link":"https:\/\/cetinkayakoc.net\/blog\/horst-feistel\/","title":{"rendered":"Horst Feistel"},"content":{"rendered":"\n<p>Horst Feistel wrote this article and published in <em>Scientific American<\/em> in May 1973 (Volume 228, No 5). It explains the importance of encryption for data protection.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" fetchpriority=\"high\" decoding=\"async\" width=\"700\" height=\"906\" src=\"https:\/\/i0.wp.com\/cetinkoc.net\/blog\/wp-content\/uploads\/2020\/02\/feistel1-700x906.jpg?resize=700%2C906\" alt=\"\" class=\"wp-image-1078\" srcset=\"https:\/\/i0.wp.com\/cetinkayakoc.net\/blog\/wp-content\/uploads\/2020\/02\/feistel1.jpg?resize=700%2C906&amp;ssl=1 700w, https:\/\/i0.wp.com\/cetinkayakoc.net\/blog\/wp-content\/uploads\/2020\/02\/feistel1.jpg?resize=600%2C776&amp;ssl=1 600w, https:\/\/i0.wp.com\/cetinkayakoc.net\/blog\/wp-content\/uploads\/2020\/02\/feistel1.jpg?resize=232%2C300&amp;ssl=1 232w, https:\/\/i0.wp.com\/cetinkayakoc.net\/blog\/wp-content\/uploads\/2020\/02\/feistel1.jpg?resize=768%2C994&amp;ssl=1 768w, https:\/\/i0.wp.com\/cetinkayakoc.net\/blog\/wp-content\/uploads\/2020\/02\/feistel1.jpg?resize=1187%2C1536&amp;ssl=1 1187w, https:\/\/i0.wp.com\/cetinkayakoc.net\/blog\/wp-content\/uploads\/2020\/02\/feistel1.jpg?resize=800%2C1035&amp;ssl=1 800w, https:\/\/i0.wp.com\/cetinkayakoc.net\/blog\/wp-content\/uploads\/2020\/02\/feistel1.jpg?w=1275&amp;ssl=1 1275w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/figure>\n\n\n\n<p>46 years after this article, Alan Konheim, the founding Chair of the UCSB&#8217;s Computer Science Department wrote an article on Horst Feistel in the Journal of Cryptographic Engineering of which I am the Editor-in-Chief. <br>Alan&#8217;s article&#8217;s link in the Journal (April 2019, Volume 9, Issue 1):  <br><a rel=\"noreferrer noopener\" href=\"https:\/\/l.facebook.com\/l.php?u=https%3A%2F%2Flink.springer.com%2Farticle%2F10.1007%2Fs13389-018-0198-5%3Ffbclid%3DIwAR2M3kvU8VoW0_nOX_XRCX2HR7-_5JRLBXoe6vwdC43mTXtUTzC8unS0MZE&amp;h=AT1cyXBXBMjbJ0yI8tmiOZ2LBnA8OrUrwr55pghWiSZJBM6EAy6jFeWFM0KciIPy-2U5KOt1VmtSyTYVsH_IXGbO5DtCvnsuG9-2gtx8DMX28nQD1WlsASnL6fyCoOg0aXFoZbcurqL3nvKa15KRl0dGxufZptLpSw\" target=\"_blank\">https:\/\/link.springer.com\/article\/10.1007\/s13389-018-0198-5<\/a><\/p>\n\n\n\n<p>Alan Konheim was my professor when I was a graduate student at UCSB. Alan died in 2019, may his soul rest in peace. <\/p>\n\n\n\n<p>The first sentence of the JCEN article&#8217;s Acknowledgement section writes:<\/p>\n\n\n\n<p> &#8220;I am particularly grateful for the assistance given by my former UCSB  student and later colleague \u00c7etin Kaya Ko\u00e7, editor-in-chief of the  Journal of Cryptographic Engineering, who invited the submission of this  paper,&#8221;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Horst Feistel wrote this article and published in Scientific American in May 1973 (Volume 228, No 5). It explains the<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[4,6],"tags":[],"class_list":["post-1077","post","type-post","status-publish","format-standard","hentry","category-cryptography","category-humans"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/cetinkayakoc.net\/blog\/wp-json\/wp\/v2\/posts\/1077","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cetinkayakoc.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cetinkayakoc.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cetinkayakoc.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cetinkayakoc.net\/blog\/wp-json\/wp\/v2\/comments?post=1077"}],"version-history":[{"count":5,"href":"https:\/\/cetinkayakoc.net\/blog\/wp-json\/wp\/v2\/posts\/1077\/revisions"}],"predecessor-version":[{"id":1151,"href":"https:\/\/cetinkayakoc.net\/blog\/wp-json\/wp\/v2\/posts\/1077\/revisions\/1151"}],"wp:attachment":[{"href":"https:\/\/cetinkayakoc.net\/blog\/wp-json\/wp\/v2\/media?parent=1077"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cetinkayakoc.net\/blog\/wp-json\/wp\/v2\/categories?post=1077"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cetinkayakoc.net\/blog\/wp-json\/wp\/v2\/tags?post=1077"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}