Abstract
This month we summarize the main issues relating to the increasing use of cryptography in the world—for example, in enhancing confidentiality, integrity, and authenticity in computers and communications. Earlier columns have considered some related topics [1].
- 1 See Inside Risks" columns by C. Weissman on export conttrols and by P. Neumamann on surveilIance, Oct. 1991 and Aug. I993, respectively.Google Scholar
- 2 Landau, S. ct af. Codes, keys, and convicts: Issues in U.S. crypto policy. ACM report for USACM (order number 207940), Jun. 1994. Google Scholar
- 3 Landau, S., et al. Crypto policy perspectives. Commun. ACM 37, 8 (Artg. 1994), 115-121. Google ScholarDigital Library
- 4 Neumann, P.G. Computer-Rela.ted Ri.sks. ACM Press (Addison Wesley, N.Y ), 1995. Google ScholarDigital Library
Index Terms
- Reassessing the crypto debate
Recommendations
Quantum Crypto: Quantum crypto: Star trek or real science?
Cryptography is a cornerstone of network security. Cryptography helps computers authenticate users across hostile networks and keeps data confidential even if the data is captured by attackers. Modern wireless networks are made safe for enterprise users ...
Segmented Crypto Algorithm
ICTCS '16: Proceedings of the Second International Conference on Information and Communication Technology for Competitive StrategiesWith the emerging Science and Technology, network security has become a major concern. Researchers have proposed new theories and applications to eradicate the unethical access to the secret message. This paper presents a new algorithm on Symmetric Key ...
Comments