skip to main content
article
Free Access

Secure personal computing in an insecure network

Published:01 August 1979Publication History
Skip Abstract Section

Abstract

A method for implementing secure personal computing in a network with one or more central facilities is proposed. The method employs a public-key encryption device and hardware keys. Each user is responsible for his own security and need not rely on the security of the central facility or the communication links. A user can safely store confidential files in the central facility or transmit confidential data to other users on the network.

References

  1. 1 Diffie, W., and Hellman, M.E. New directions in cryptography. 1EEE Trans. Inform. Theory IT-22, 6 (Nov. 1976), 644-654.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2 Flynn, R., and Campasano, A.S. Data dependent keys for a selective encryption terminal. Proc. AFIPS 1978 NCC, Vol. 47, AFIPS Press, Montvale, N.J., pp. 1127-1129.]]Google ScholarGoogle Scholar
  3. 3 Hellman, M.E. Security in communication networks. Proc. AFIPS 1978 NCC, Vol. 47, AFIPS Press, Montvale, N.J., pp. 1131- 1134.]]Google ScholarGoogle Scholar
  4. 4 Konfelder, L.M. A method for certification. Tech. Rep., Lab. for Comptr. Sci., M.I.T., Cambridge, Mass., May 1978.]]Google ScholarGoogle Scholar
  5. 5 Konheim, A.G. Cryptographic methods for data protection. Res. Rep. RC 7026 (#30100), IBM Thomas J. Watson Res. Ctr., Yorktown Heights, N.Y., March 1978.]]Google ScholarGoogle Scholar
  6. 6 Lampson, B.W. A note on the confinement problem. Comm. ACM 16, 10 (Oct. 1973), 613-615.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7 Lempel, A. Cryptography in transition. Comptg. Surveys (to appear).]]Google ScholarGoogle Scholar
  8. 8 Merkle, R.C. Secure communication over an insecure eliannel. Comm. ACM 21, 4 (April 1978), 294-299.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9 Merkle, R.C., and Hellman, M.E. Hiding information and signatures in trap door knapsacks. IEEE Trans. Inform. Theory IT-24, 5 (Sept. 1978), 525-530.]]Google ScholarGoogle ScholarCross RefCross Ref
  10. 10 Montgomery, W.A. Measurements of sharing in MULTICS. Proc. 6th Symp. on Operating Syst. Principles, Spec. issue, Operating Syst. Rev. (ACM) 11, 5, Nov. 1977, pp. 85-90.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11 National Bureau of Standards. Data Encryption Standard. FIPS PUB 46, Washington, D.C., Jan. 1977.]]Google ScholarGoogle Scholar
  12. 12 Needham, R., and Schroeder, M. Security and authentication in large networks of computers. Comm. ACM 21, 12 (Dec. 1978), 993- 999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. 13 Popek, G.J., and Kline, C.S. Design issues for secure computer networks. In Operating Systems, an Advanced Course, R. Bayer, R.M. Graham, and G. SeegmuUer, Eds., Springer-Verlag, New York, 1978.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. 14 Rivest, R.L., Shamir, A., and Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM 21, 2 (Feb. 1978), 120-126.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. 15 Rivest, R.L., Adleman, L., and Dertouzos, M.L. On data banks and privacy homomorphisms. In Foundations of Secure Computation, R. DeMillo, D. Dobkin, A. Jones, and R.L. Lipton, Eds., Academic Press, New York, 1978.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. 16 Saltzer, J. On digital signatures. Operating Syst. Rev. 12, 2 (April 1978), 12-14.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. 17 Simmons, G.J. Computational complexity and secure communications. Comptg. Surveys (to appear).]]Google ScholarGoogle Scholar
  18. 18 Tanenbaum, A. A distributed interactive computing system. IR-20, Vrije Universiteit, The Netherlands, June 1977.]]Google ScholarGoogle Scholar

Index Terms

  1. Secure personal computing in an insecure network
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image Communications of the ACM
            Communications of the ACM  Volume 22, Issue 8
            Aug. 1979
            40 pages
            ISSN:0001-0782
            EISSN:1557-7317
            DOI:10.1145/359138
            Issue’s Table of Contents

            Copyright © 1979 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 August 1979

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader