scispace - formally typeset
Search or ask a question

Showing papers on "40-bit encryption published in 1983"


Patent
07 Mar 1983
TL;DR: An improved file access security technique and associated apparatus accesses data which is stored in encrypted form under one encryption key and re-stores the data re-encrypted under another encryption key, and produces a record of each access and data reencryption both as the control source of encryption keys for access and reentry of encrypted data and as a secured audit record of users that had access to each file.
Abstract: An improved file access security technique and associated apparatus accesses data which is stored in encrypted form under one encryption key and re-stores the data re-encrypted under another encryption key, and produces a record of each access and data re-encryption both as the control source of encryption keys for access and re-entry of encrypted data and as a secured audit record of users that had access to each file.

228 citations


Patent
24 Oct 1983
TL;DR: An encryption system in which a code word is processed, byte by byte, by a Vernan type process followed by non-linear encryption techniques, all of which are repeated several times, to generate a working key schedule is then used in the same process to encrypt the text as discussed by the authors.
Abstract: An encryption system in which a code word is processed, byte by byte, by a Vernan type process followed by non-linear encryption techniques, all of which are repeated several times, to generate a working key schedule. This key schedule is then used in the same process to encrypt the text.

62 citations


Book ChapterDOI
01 Jan 1983
TL;DR: This note describes five regular properties of the ‘Data Encryption Standard’ or DES, two of which have been described elsewhere and are included for completeness.
Abstract: A cipher function y = E(k,x) should appear to be a random function of both the key k and the plaintext x Any regular behaviour is of interest to the users In the extreme case regular properties might point to a weakness of the cipher Precautions are needed in the use of a cipher that has regular features This note describes five regular properties of the ‘Data Encryption Standard’ or DES, two of which have been described elsewhere, are included for completeness

59 citations


Proceedings ArticleDOI
25 Apr 1983
TL;DR: A secure implementation for subkey database encryption is presented and both Vertical and Horizontal access to the control encrypted date are defined and described.
Abstract: A secure implementation for subkey database encryption is presented. Both Vertical and Horizontal access to the control encrypted date are defined and described. Communication protocols between user and system are also provided.

7 citations


Journal ArticleDOI
TL;DR: A data security communications interface unit has been developed to allow data transfer between Apple terminals in either plain or encrypted format under user control and has a degree of sophistication sufficient to meet most user needs.

1 citations