scispace - formally typeset
Search or ask a question

Showing papers on "Encryption published in 1899"


DOI
30 Dec 1899
TL;DR: The first section describes the public key systems of References 5 and 8 as well as systems devised by Rivest, Shamir and Adleman, 9 McEliece,lO and Merkle and Hellman, and proposed that it is possible to converse securely over an insecure channel with no prearrangement through use of "public key systems."
Abstract: It may seem anomolous that electronic mail and other computer communication systems require cryptographic protection when almost no physical mail is given this protection. The difference is that computer readable traffic is extremely vulnerable to automatic sorting at very low cost. Physical mail would also need to be encrypted if it were all written on postcards and could be sorted at a cost of only $1 for several million pages. Even seemingly innocuous facts can be damaging when such vast amounts of data can be screened for all messages mentioning one of a list of key words (e.g., computer communications, electronic mail, EFT, etc.). Analog voice circuits are as vulnerable to wiretapping, but are expensive to sort. Fortunately, the digital nature of the data makes high grade encryption possible at low cost. Analog circuits are almost impossible to adequately secure without going through a digital interface and encryption. The National Bureau of Standards has promulgated a national data encryption standard which can be implemented on a single LSI chip. 1 In large quantities it should therefore cost on the order of $10, an insignificant addition to the cost of a computer terminal. While some have criticized the standard as being inadequately secure,2-4 this is not due to technical constraints, but rather appears to be a political problem. While the cost of the encryption hardware is not a barrier to the widespread use of cryptography in computer oriented systems, there are other costs and problems which must be considered. Key distribution is one such problem.5 In a network with n users there are approximately n/2 possible pairs of users who may wish to converse securely from all other users. The distribution of this many keys by courier, registered mail, etc. is clearly uneconomic even for n equal to one million. This problem can be solved by having the system itself distribute keys, encrypted in user specific system keys or passwords, but this requires the system to be secure. ,7 A more useful approach was suggested by Diffie and Hellman5 and Merkle. S They proposed that it is possible to converse securely over an insecure channel with no prearrangement through use of "public key systems." The second section describes the public key systems of References 5 and 8 as well as systems devised by Rivest, Shamir and Adleman, 9 McEliece,lO and Merkle and Hellman. 11

8 citations


DOI
30 Dec 1899
TL;DR: In this paper, the authors examined the use of passwords for controlled access to remote computer resources and discussed the ways of protecting passwords, and attendant cost considerations, similar similarities between passwords and data encryption keys are noted.
Abstract: The widespread use of remote computer resources has made the problem of personal authentication most urgent. This paper examines the use of passwords for controlled access to these resources. Password techniques, ways of protecting passwords, and attendant cost considerations are discussed. Similarities between passwords and data encryption keys are noted and general recommendations for the use of passwords are presented.

4 citations


DOI
Daniel Minoli1
30 Dec 1899
TL;DR: A Markov chain model is presented which enables one to obtain in closed form the optimal rates at which repeaters and station must transmit initialization packets and labels to minimize the network initialization time in a one-hop network, two buffer station.
Abstract: The Packet Radio Network (PRNET), a store-and-forward packet-switching system sharing a single radio channel via multi-access techniques and spread spectrum, is an effective communication medium for data and voice transmission in situations requiring fast deployment, non-fixed hardware locations, encryption and anti-jamming in hostile military environments. 1 – 5 , 14 , 15

1 citations