Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Cryptography for computer security: making the decision
Fisher W. Computers and Security3 (3):229-233,1984.Type:Article
Date Reviewed: Jun 1 1985

Why encrypt? I once heard Grace Hopper say that our next big task is to decide what information should be tossed out to reduce archival expense. This remark, juxtaposed with Fisher’s paper, leads inevitably to Early’s Second Law, “If it ain’t worth saving, it ain’t worth encrypting.” Fisher’s more modest thesis is, “Even if it is worth keeping, it’s not necessarily worth encrypting.”

Having said that, little else of note is in Fisher’s paper. Reading it will provide a rather pleasant, five-minute introduction for those who know nothing about computer security, but who are forced to deal with it.

The author discusses, briefly, some definitions: encryption, decryption, transposition, substitution, and the National Bureau of Standards Data Encrypti- on Standard. He presents some situations in which security can be provided without encryption: physical security, passwords, limited access (the Coca Cola formula). He also notes some areas where encryption cannot help: theft of plaintext copies, unauthorized use of terminals after the establishment of communications, physical destruction of encrypted data, modification of software that manipulates encrypted data, and fraud or theft by authorized users.

To repeat, this is a four-page primer, an overview, for the novice.

Reviewer:  G. G. Early Review #: CR109236
Bookmark and Share
 
Cryptographic Controls (D.4.6 ... )
 
 
Abuse And Crime Involving Computers (K.4.2 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Cryptographic Controls": Date
Cryptology: machines, history and methods
Deavours C., Kahn D., Kruh L., Mellen G. (ed), Winkel B. (ed) Artech House, Inc., Norwood, MA,1989. Type: Divisible Book
Jan 1 1992
Transaction security system
Abraham D., Dolan G., Double G., Stevens J. (ed) IBM Systems Journal 30(2): 206-229, 1991. Type: Article
Mar 1 1992
A high speed manipulation detection code
Jueneman R.  Advances in cryptology--CRYPTO ’86 (, Santa Barbara, CA, Aug 11-15, 1987)3461987. Type: Proceedings
Oct 1 1988
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy