skip to main content
10.1145/1476793.1476848acmotherconferencesArticle/Chapter ViewAbstractPublication PagesafipsConference Proceedingsconference-collections
research-article
Free access

Cryptographic techniques for computers

Published: 14 May 1969 Publication History

Abstract

The use of systems of secret communications as an economical method to increase the security of confidential computerized files has stimulated much interest. Just recently during Congressman Gallagher's Congressional hearings on privacy, it was repeatedly suggested that cryptographic-type protection should be used for data communication lines and storage of confidential information in order to make eavesdropping an extremely difficult task. Today, one finds the very nature of computerized information systems actually facilitates its unlawful reproduction and transmission to anyone with the tools and know-how. Unlike information which is stored with scrambling techniques, information stored in clear form requires no sophisticated technology, nor complex deciphering systems for either decoding or dissemination. More importantly, there is good reason to assume that organized crime and industrial spies have, or will have, the knowledge and the financial resources necessary to acquire and misuse the information in most systems now being considered, including the tapping of communication lines. Finally, once a piece of information is lost, its original confidentiality can never be regained. Since information which has previously been scattered among several rather protected and widespread sources is being collected into one place, wholesale theft of information is very likely to become a continuing fact of life for the American public.

References

[1]
The computer and Invasion of privacy Hearings Before a Subcommittee on Government Operations House of Representatives July 26--28 1966 U.S. Government Printing Office Washington D.C. 1966
[2]
H E Peterson R Turn System implication of information privacy Proc S J C C 1967
[3]
D D Millikin Elementary crytography and crytanalysis New York University New York 1943
[4]
P Baran On distributed communications: IX. security, secrecy and tamper-free considerations RM--3765--PR The RAND Corporation Santa Monica California August 1964

Cited By

View all
  • (1976)The application of cryptography for data base securityProceedings of the June 7-10, 1976, national computer conference and exposition10.1145/1499799.1499814(97-107)Online publication date: 7-Jun-1976
  • (1973)A homophonic cipher for computational cryptographyProceedings of the June 4-8, 1973, national computer conference and exposition10.1145/1499586.1499729(565-568)Online publication date: 4-Jun-1973

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
AFIPS '69 (Spring): Proceedings of the May 14-16, 1969, spring joint computer conference
May 1969
902 pages
ISBN:9781450379021
DOI:10.1145/1476793
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • AFIPS: American Federation of Information Processing Societies

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 May 1969

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)99
  • Downloads (Last 6 weeks)27
Reflects downloads up to 17 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (1976)The application of cryptography for data base securityProceedings of the June 7-10, 1976, national computer conference and exposition10.1145/1499799.1499814(97-107)Online publication date: 7-Jun-1976
  • (1973)A homophonic cipher for computational cryptographyProceedings of the June 4-8, 1973, national computer conference and exposition10.1145/1499586.1499729(565-568)Online publication date: 4-Jun-1973

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media