Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Whither Cryptography

Whither Cryptography There are three widely held beliefs about cryptology which underpin much research on the subject, guide substantial industrial investment and inform most of the associated public policy debate. These are, first, that the cryptographic systems are mostly used to keep communications secure, in the sense of ensuring that an electronic message is secret and/or authentic. In the second of these roles, cryptology provides a useful (if not only) means of securing electronic evidence in such a way that it will be accepted by a court, and is thus indispensable to the future development of electronic commerce. Third, most attacks on cryptographic systems involve technical skill at cryptanalysis, and such systems can therefore be made sufficiently robust by using standard, well studied encryption and signature algorithms. Shows that these three beliefs are almost completely mistaken. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Information Management & Computer Security Emerald Publishing

Loading next page...
 
/lp/emerald-publishing/whither-cryptography-VV3kex2z20

References (5)

Publisher
Emerald Publishing
Copyright
Copyright © 1994 MCB UP Ltd. All rights reserved.
ISSN
0968-5227
DOI
10.1108/09685229410792961
Publisher site
See Article on Publisher Site

Abstract

There are three widely held beliefs about cryptology which underpin much research on the subject, guide substantial industrial investment and inform most of the associated public policy debate. These are, first, that the cryptographic systems are mostly used to keep communications secure, in the sense of ensuring that an electronic message is secret and/or authentic. In the second of these roles, cryptology provides a useful (if not only) means of securing electronic evidence in such a way that it will be accepted by a court, and is thus indispensable to the future development of electronic commerce. Third, most attacks on cryptographic systems involve technical skill at cryptanalysis, and such systems can therefore be made sufficiently robust by using standard, well studied encryption and signature algorithms. Shows that these three beliefs are almost completely mistaken.

Journal

Information Management & Computer SecurityEmerald Publishing

Published: Dec 1, 1994

Keywords: Automated teller machines; Data security; Electronic data interchange; Security

There are no references for this article.