Computers and computer data networks are becoming increasingly crucial in the day-to-day operation of our modern society. We are fast becoming dependent on networks in such fundamental areas as banking, retailing, law enforcement, education, government administration, and many more. Most people are barely aware of, much less concerned about, the huge amount of their personal information that is accumulating in various government and private data bases, with much of it conceivably accessible via one or more data networks. Although already widespread, this trend toward storing more information in computers, providing more network access to it, and relying more heavily upon it is accelerating and promises to be pervasive in the near future.
KeywordsBlock Cipher Network Security Stream Cipher Data Encryption Standard Computer Crime
Unable to display preview. Download preview PDF.
- 1.D. Kahn, The Code Breakers, McMillan, New York (1967).Google Scholar
- 2.Data Encryption Standard (FIPS Pub. 46), National Bureau of Standards, Washington D.C. (1977).Google Scholar
- 4.DES Modes of Operation (FIPS Pub. 81), National Bureau of Standards, Washington, D.C. (1980).Google Scholar
- 7.D. W. Davies (ed.), The Security of Data in Networks, IEEE Press, New York (1981).Google Scholar
- L. D. Smith, Cryptography the Science of Secret Writing, reprint of 1943 version by Dover, New York (1955).Google Scholar
- IEEE Communications Magazine (Special Issue on Communications Privacy) 16(6), (1978).Google Scholar
- D. E. Davis (ed.), The Security of Data Networks, IEEE Press, New York (1981).Google Scholar
- IEEE Communications Magazine (Special Issue on Computer Security) 23(7), (1985).Google Scholar
- M. D. J. Buss and L. M. Salerno, Common sense and computer security, Harvard Business Rev. 62 (2), 112–121 (1984).Google Scholar
- Glossary for Computer Systems Security (FIPS Pub. 39), National Bureau of Standards, Washington, D.C. (1976).Google Scholar