skip to main content
10.1145/1500774.1500836acmotherconferencesArticle/Chapter ViewAbstractPublication PagesafipsConference Proceedingsconference-collections
research-article
Free access

The implementation of a cryptography-based secure office system

Published: 07 June 1982 Publication History

Abstract

A cryptography-based secure office system is discussed, including design criteria and a specific implementation. The system is intended to be practical, simple, and inexpensive, but also highly secure. The implementation uses a hybrid scheme of conventional (DES) and public-key (RSA) cryptography. Randomly generated DES keys encrypt messages and files, and the DES keys themselves and a one-way hash of the messages are encrypted and signed by RSA keys. The system provides secure electronic mail (including electronic registered mail and an electronic notary public), secure two-way channels, and secure user files. Timestamps and a special signed file of public keys help decrease the need for an online central authority involved in all transactions.

References

[1]
Lagger, H., C. Mueller-Schloer, and H. Unterberger. "Security Aspects of Computer Controlled Communications Systems" (in German). Elektronische Rechenanlagen, 22 (1980), pp. 276--280.
[2]
Denning, D. E. "Secure Personal Computing in an Insecure Network." Communications of the ACM, 22 (1979), pp. 476--482.
[3]
"Data Encryption Standard." Federal Information Processing Standard (FIPS) Publication No. 46, National Bureau of Standards, January 1977.
[4]
Rivest, R. A., A. Shamir, and L. Adleman. "A Method of Obtaining Digital Signatures and Public-Key Cryptosystems." Communications of the ACM, 21 (1978), pp. 120--126.
[5]
Merkle, R. C., and M. E. Hellman. "On the Security of Multiple Encryption." Communications of the ACM, 24 (1981), pp. 465--467.
[6]
Needham, R. M., and M. D. Schroeder. "Using Encryption for Authentication in Large Networks of Computers." Communications of the ACM, 21 (1978), pp. 993--999.
[7]
Rivest, R. L. "A Description of a Single-Chip Implementation of the RSA Cipher." Lambda, 1 (1980), pp. 14--18.
[8]
Merkle, R. C., and M. E. Hellman. "Hiding Information and Signatures in Trapdoor Knapsacks." IEEE Transactions on Information Theory, IT-24 (1978), pp. 525--530.
[9]
Mueller-Schloer, C. "The Usage of DES-generated Checksums for Electronic Signatures." Internal Report CRT-81-TM-043, Siemens Corporation, Cherry Hill, New Jersey, September 1981.
[10]
Davies, D. W., and W. L. Price. "The Application of Digital Signatures Based on Public Key Cryptosystems." In J. Salz (ed.), Proceedings of the Fifth International Conference on Computer Communication, The International Council for Computer Communication, 1980, pp. 525--530.
[11]
Simmons, G. J. "Secure Communications in the Presence of Pervasive Deceit." In Proceedings of the 1980 Symposium on Security and Privacy. IEEE Computer Society, 1980, pp. 84--93.
[12]
Merkle, R. C. "Protocols for Public Key Cryptosystems." In Proceedings of the 1980 Symposium on Security and Privacy. IEEE Computer Society, 1980, pp. 122--134.
[13]
Denning, D. E., and G. M. Sacco. "Timestamps in Key Distribution Protocols," Communications of the ACM, 24 (1981), 8, pp. 533--536.
[14]
Wagner, N. R., "Practical Approaches to Secure Computer Systems," Technical Report UH-CS-81-3, Computer Science Department, University of Houston, Texas, April 1981.
[15]
Popek, G. J., and C. S. Kline, "Encryption and Secure Computer Networks," Computing Surveys, 11 (1979), 4, pp. 331--356.

Cited By

View all
  • (2018)OriginStamp: A blockchain-backed system for decentralized trusted timestampingit - Information Technology10.1515/itit-2018-002060:5-6(273-281)Online publication date: 28-Nov-2018
  • (2018)A Microprocessor-based CryptoprocessorIEEE Micro10.1109/MM.1983.2911603:5(5-15)Online publication date: 29-Dec-2018

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
AFIPS '82: Proceedings of the June 7-10, 1982, national computer conference
June 1982
857 pages
ISBN:088283035X
DOI:10.1145/1500774
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • AFIPS: American Federation of Information Processing Societies

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 June 1982

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)42
  • Downloads (Last 6 weeks)10
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2018)OriginStamp: A blockchain-backed system for decentralized trusted timestampingit - Information Technology10.1515/itit-2018-002060:5-6(273-281)Online publication date: 28-Nov-2018
  • (2018)A Microprocessor-based CryptoprocessorIEEE Micro10.1109/MM.1983.2911603:5(5-15)Online publication date: 29-Dec-2018

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media