scispace - formally typeset
Search or ask a question

Showing papers on "Encryption published in 1974"


01 Sep 1974
TL;DR: A brief survey of privacy systems is presented--the techniques that can be used to provide communications security in commercial systems--and then the protective characteristics of several classes of privacy transformations (encryption techniques) are examined.
Abstract: : There is an increasing need for providing privacy and security in telecommunication and teleprocessing networks. This paper presents a brief survey of privacy systems--the techniques that can be used to provide communications security in commercial systems--and then examines in qualitative terms the protective characteristics of several classes of privacy transformations (encryption techniques). The emphasis is on the level of protection that can be expected and the effects of the telecommunication network characteristics on the performance of the privacy system, and vice versa. (Author)

4 citations


ReportDOI
01 Jul 1974
TL;DR: Questions addressed are: How complex is it to implement an algorithm in software designed primarily for digital hardware and can such a program perform well enough for use in the I/O system of a large time- sharing system.
Abstract: : Recently IBM Corporation has declassified an algorithm for encryption usable for computer-to-computer or computer-to-terminal communications. Their algorithm was implemented in a hardware device called Lucifer. A software implementation of Lucifer for MULTICS is described. A proof of the algorithm's reversibility for deciphering is provided. A special hand-coded (assembly language) version of Lucifer is described whose goal is to attain performance as close as possible to that of the hardware device. Performance measurements of this program are given. Questions addressed are: How complex is it to implement an algorithm in software designed primarily for digital hardware. Can such a program perform well enough for use in the I/O system of a large time- sharing system.

3 citations