skip to main content
10.1145/1499586.1499733acmotherconferencesArticle/Chapter ViewAbstractPublication PagesafipsConference Proceedingsconference-collections
research-article
Free access

Design considerations for cryptography

Published: 04 June 1973 Publication History

Abstract

Enciphering data can protect the transmission of information against unauthorized observers. One way of doing this when data is transmitted in binary form is to add random numbers to the data. If the string of random numbers is never repeated, the scheme is unbreakable. p. 398.

References

[1]
Kahn, D., The Code Breakers, the Mcmillan Company, New York, 1968.
[2]
Golomb, S., "Shift Register Sequences," Modern Algebra Series, Holen Day, 1967.
[3]
Girdansky, M. B., "Data Privacy, Cryptology and the Computer at IBM Research," IBM Research Reports, Vol. 7, No. 4, 1971.

Cited By

View all
  • (1979)Privacy and authentication: An introduction to cryptographyProceedings of the IEEE10.1109/PROC.1979.1125667:3(397-427)Online publication date: 1979
  • (1978)Security and PrivacyThe IEEE Computer Society's Second International Computer Software and Applications Conference, 1978. COMPSAC '78.10.1109/CMPSAC.1978.810378(194-203)Online publication date: 1978

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
AFIPS '73: Proceedings of the June 4-8, 1973, national computer conference and exposition
June 1973
936 pages
ISBN:9781450379168
DOI:10.1145/1499586
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • AFIPS: American Federation of Information Processing Societies

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 June 1973

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)34
  • Downloads (Last 6 weeks)5
Reflects downloads up to 20 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (1979)Privacy and authentication: An introduction to cryptographyProceedings of the IEEE10.1109/PROC.1979.1125667:3(397-427)Online publication date: 1979
  • (1978)Security and PrivacyThe IEEE Computer Society's Second International Computer Software and Applications Conference, 1978. COMPSAC '78.10.1109/CMPSAC.1978.810378(194-203)Online publication date: 1978

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media