Skip to main content

Cryptography and Computer Privacy

Computer systems in general and personal "data banks" in particular need protection. This can be achieved by enciphering all material and authenticating the legitimate origin of any command to the computer

00
Scientific American Magazine Vol 228 Issue 5This article was originally published with the title “Cryptography and Computer Privacy” in Scientific American Magazine Vol. 228 No. 5 (), p. 15
doi:10.1038/scientificamerican0573-15