{"title":"Public key vs. conventional key encryption*","authors":"C. Kline, G. Popek","doi":"10.1109/MARK.1979.8817073","DOIUrl":null,"url":null,"abstract":"As distributed computer systems grow and their convenience attracts uses for which maintenance of privacy and security is important, the means by which encryption is integrated into these systems also becomes important. Encryption is the only practical way by which secure, private communication can be conducted while employing untrusted media to carry the transmission. The interest has spurred developments in the use of conventional encryption algorithms and there is even a federal standard algorithm for commercial use. 4 In addition, an innovative approach to encryption, called public key algorithms, has recently been proposed as a way to address many of the key distribution and other problems which are present in conventional algorithm-based approaches.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1979-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"1979 International Workshop on Managing Requirements Knowledge (MARK)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MARK.1979.8817073","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13
Abstract
As distributed computer systems grow and their convenience attracts uses for which maintenance of privacy and security is important, the means by which encryption is integrated into these systems also becomes important. Encryption is the only practical way by which secure, private communication can be conducted while employing untrusted media to carry the transmission. The interest has spurred developments in the use of conventional encryption algorithms and there is even a federal standard algorithm for commercial use. 4 In addition, an innovative approach to encryption, called public key algorithms, has recently been proposed as a way to address many of the key distribution and other problems which are present in conventional algorithm-based approaches.