skip to main content
article
Free Access

Advanced cryptographic techniques for computer

Published:01 December 1969Publication History
Skip Abstract Section

Abstract

Cryptographic techniques which can be used to maintain the confidentiality of information processed by computers are dealt with. Special emphasis is paid to the unique characteristics of computer files that make many cryptographic methods of little use. Relative security, costs, and preferred methods are included in this paper.

References

  1. 1 The computer and invasion of privacy. Hearings Before a Subcommittee on Government Operations, House of Representatives, July 26-28, 1966. US Government Printing Office, Washington, D. C., 1966.Google ScholarGoogle Scholar
  2. 2 PETERSON, H. E., AND TURN, R. System implication of information privacy. Proc. AFIPS 1967 Spring Joint Comput. Conf., Thompson Book Co., Washington, D. C., pp. 291-300.Google ScholarGoogle Scholar
  3. 3 VAN TASSEL, D. L. Cryptographic techniques for computers. Proc. AFIPS 1969 Spring Joint Comput. Conf., AFIPS Press, Montvale, N. J., pp. 367-372.Google ScholarGoogle Scholar
  4. 4 VAN TASSEL, D. L. Keeping confidential information confidential. J. Systems Management (Feb. 1969).Google ScholarGoogle Scholar
  5. 5 BARAN, PAUL. On distributed communications: IX. Security, secrecy, and tamper-free considerations. RM-3765-PR, The Rand Corp., Santa Monica, Cal., 1964.Google ScholarGoogle Scholar
  6. 6 GAINES, H. F. Cryplanalysis. Dover, New York, 1956.Google ScholarGoogle Scholar
  7. 7 SHANNON, C. E. Communication theory of secrecy systems. Bell Syst. Tech. J. (Oct. 1949), 656-715.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Advanced cryptographic techniques for computer

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in

              Full Access

              • Published in

                cover image Communications of the ACM
                Communications of the ACM  Volume 12, Issue 12
                Dec. 1969
                120 pages
                ISSN:0001-0782
                EISSN:1557-7317
                DOI:10.1145/363626
                Issue’s Table of Contents

                Copyright © 1969 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 1 December 1969

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • article

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader