scispace - formally typeset
Journal ArticleDOI

Public key management for network security

D. B. Newman, +2 more
- 01 Apr 1987 - 
- Vol. 1, Iss: 2, pp 11-16
Reads0
Chats0
TLDR
A tutorial is given on two public key cryptographic systems that provide an alternative to classical cryptographic key management techniques: the RSA system and the SEEK system.
Abstract
A tutorial is given on two public key cryptographic systems that provide an alternative to classical cryptographic key management techniques: the RSA system and the SEEK system. The certification of public numbers is discussed.

read more

Citations
More filters
Patent

Enhanced cryptographic system and method with key escrow feature

Sudia Frank W
TL;DR: In this article, a cryptographic system with key escrow feature that uses a method for verifiably splitting user's private encryption keys into components and for sending those components to trusted agents chosen by the particular users is provided.
Proceedings ArticleDOI

A network security monitor

TL;DR: Initial results demonstrate that many network attacks are detectable with the authors' monitor, although it can be defeated.
Patent

Rolling code security system

TL;DR: In this article, a rolling code transmitter is used in a security system for providing secure encrypted RF transmission comprising an interleaved trinary bit fixed code and rolling code, where a receiver demodulates the encrypted RF transmissions and recovers the fixed codes and rolling codes.
Journal ArticleDOI

A new carry-free division algorithm and its application to a single-chip 1024-b RSA processor

TL;DR: A carry-free division algorithm is described based on the properties of redundant signed digit (RSD) arithmetic to avoid carry propagation and uses the minimum hardware per bit, i.e. one full adder.
Patent

Method and system for securely displaying and confirming request to perform operation on host computer

TL;DR: In this article, a system for a client user remotely connected to a server computer by a client workstation such as a client personal computer to have securely displayed and to securely confirm that a request to access a resource on the server computer was actually requested by the client user, even if the security of the client computer has been compromised.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.