Abstract
Cryptographic techniques which can be used to maintain the confidentiality of information processed by computers are dealt with. Special emphasis is paid to the unique characteristics of computer files that make many cryptographic methods of little use. Relative security, costs, and preferred methods are included in this paper.
- 1 The computer and invasion of privacy. Hearings Before a Subcommittee on Government Operations, House of Representatives, July 26-28, 1966. US Government Printing Office, Washington, D. C., 1966.Google Scholar
- 2 PETERSON, H. E., AND TURN, R. System implication of information privacy. Proc. AFIPS 1967 Spring Joint Comput. Conf., Thompson Book Co., Washington, D. C., pp. 291-300.Google Scholar
- 3 VAN TASSEL, D. L. Cryptographic techniques for computers. Proc. AFIPS 1969 Spring Joint Comput. Conf., AFIPS Press, Montvale, N. J., pp. 367-372.Google Scholar
- 4 VAN TASSEL, D. L. Keeping confidential information confidential. J. Systems Management (Feb. 1969).Google Scholar
- 5 BARAN, PAUL. On distributed communications: IX. Security, secrecy, and tamper-free considerations. RM-3765-PR, The Rand Corp., Santa Monica, Cal., 1964.Google Scholar
- 6 GAINES, H. F. Cryplanalysis. Dover, New York, 1956.Google Scholar
- 7 SHANNON, C. E. Communication theory of secrecy systems. Bell Syst. Tech. J. (Oct. 1949), 656-715.Google ScholarCross Ref
Index Terms
- Advanced cryptographic techniques for computer
Recommendations
Cryptanalysis and Improvement of a Certificateless Multi-proxy Signature Scheme
Certificateless cryptography is a new type of public key cryptography, which removes the certificate management problem in traditional public key cryptography and the key escrow problem in identity-based public key cryptography. Multi-proxy signature is ...
On the security of a provably secure certificateless strong designated verifier signature scheme based on bilinear pairings
ICTCE '17: Proceedings of the 2017 International Conference on Telecommunications and Communication EngineeringA strong designated verifier signature (SDVS) is a variation of traditional digital signatures, since it allows a signer to designate an intended receiver as the verifier rather than anyone. To do this, a signer must incorporate the verifier's public ...
Breaking an ID-based encryption based on discrete logarithm and factorization problems
We cryptanalyse the new ID-based encryption scheme proposed by Meshram.We find a method to factorize N, where N is the parameter proposed by Meshram.We also give a method to recover the secret master key of Meshram's ID-based encryption scheme.We also ...
Comments