Academia.eduAcademia.edu

Outline

Secure personal computing in an insecure network

1979, Communications of the ACM

https://doi.org/10.1145/359138.359143

Abstract

A method for implementing secure personal computing in a network with one or more central facilities is proposed. The method employs a public-key encryption device and hardware keys. Each user is responsible for his own security and need not rely on the security of the central facility or the communication links. A user can safely store confidential files in the central facility or transmit confidential data to other users on the network.

References (19)

  1. National Bureau of Standards. Data Encryption Standard. FIPS PUB 46, Washington, D.C., Jan. 1977.
  2. Needham, R., and Schroeder, M. Security and authentication in large networks of computers. Comm. ACM 21, 12 (Dec. 1978), 993- 999.
  3. Popek, G.J., and Kline, C.S. Design issues for secure computer networks. In Operating Systems, an Advanced Course, R. Bayer, R.M. Graham, and G. SeegmuUer, Eds., Springer-Verlag, New York, 1978.
  4. Rivest, R.L., Shamir, A., and Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM 21, 2 (Feb. 1978), 120-126.
  5. Rivest, R.L., Adleman, L., and Dertouzos, M.L. On data banks and privacy homomorphisms. In Foundations of Secure Computation, R. DeMillo, D. Dobkin, A. Jones, and R.L. Lipton, Eds., Academic Press, New York, 1978.
  6. Saltzer, J. On digital signatures. Operating Syst. Rev. 12, 2 (April 1978), 12-14.
  7. Simmons, G.J. Computational complexity and secure communications. Comptg. Surveys (to appear).
  8. Tanenbaum, A. A distributed interactive computing system. IR-20, Vrije Universiteit, The Netherlands, June 1977. References
  9. Diffie, W., and Hellman, M.E. New directions in cryptography. 1EEE Trans. Inform. Theory IT-22, 6 (Nov. 1976), 644-654.
  10. Flynn, R., and Campasano, A.S. Data dependent keys for a selective encryption terminal. Proc. AFIPS 1978 NCC, Vol. 47, AFIPS Press, Montvale, N.J., pp. 1127-1129.
  11. Hellman, M.E. Security in communication networks. Proc. AFIPS 1978 NCC, Vol. 47, AFIPS Press, Montvale, N.J., pp. 1131- 1134.
  12. Konfelder, L.M. A method for certification. Tech. Rep., Lab. for Comptr. Sci., M.I.T., Cambridge, Mass., May 1978.
  13. Konheim, A.G. Cryptographic methods for data protection. Res. Rep. RC 7026 (#30100), IBM Thomas J. Watson Res. Ctr., Yorktown Heights, N.Y., March 1978.
  14. Lampson, B.W. A note on the confinement problem. Comm. ACM 16, 10 (Oct. 1973), 613-615.
  15. Lempel, A. Cryptography in transition. Comptg. Surveys (to appear).
  16. $. Merkle, R.C. Secure communication over an insecure eliannel. Comm. ACM 21, 4 (April 1978), 294-299.
  17. Merkle, R.C., and Hellman, M.E. Hiding information and signatures in trap door knapsacks. IEEE Trans. Inform. Theory IT-24, 5 (Sept. 1978), 525-530.
  18. Montgomery, W.A. Measurements of sharing in MULTICS.
  19. Proc. 6th Symp. on Operating Syst. Principles, Spec. issue, Operating Syst. Rev. (ACM) 11, 5, Nov. 1977, pp. 85-90.