Around 2000 BC the Egyptians developed what was perhaps the first key operated lock mechanism. This device consisted of a solid beam, carved from hardwood and hollowed from the end to create a slot. When locked, this beam was prevented from moving by the means of pegs in a staple, that were attached to the hollowed beam. Unlocking the lock required a key, typically a foot in length or more. This ancient design evolved into its modern day equivalent known as the tumbler lock, still using fundamentally the same technology. The only major difference is simply the size.
KeywordsHash Function Electronic Commerce Certification Authority Data Encryption Standard Secure Socket Layer
Unable to display preview. Download preview PDF.
- 1.Computerworld, 7 February 1994.Google Scholar
- 3.R. Morris and K. Thompson, “Password Security: A Case History”, Communications of the ACM, Volume 22 Number 11,1979.Google Scholar
- 4.A. Warman, Computer Security Within Organisations, 1993.Google Scholar
- 7.Wall Street Journal, 28 April 1994.Google Scholar
- 8.M. Elkins, “MIME Security With Pretty Good Privacy (PGP)”, RFC 2015, September 1996.Google Scholar