Computing Reviews

Cryptography for computer security: making the decision
Fisher W. Computers and Security3(3):229-233,1984.Type:Article
Date Reviewed: 06/01/85

Why encrypt? I once heard Grace Hopper say that our next big task is to decide what information should be tossed out to reduce archival expense. This remark, juxtaposed with Fisher’s paper, leads inevitably to Early’s Second Law, “If it ain’t worth saving, it ain’t worth encrypting.” Fisher’s more modest thesis is, “Even if it is worth keeping, it’s not necessarily worth encrypting.”

Having said that, little else of note is in Fisher’s paper. Reading it will provide a rather pleasant, five-minute introduction for those who know nothing about computer security, but who are forced to deal with it.

The author discusses, briefly, some definitions: encryption, decryption, transposition, substitution, and the National Bureau of Standards Data Encrypti- on Standard. He presents some situations in which security can be provided without encryption: physical security, passwords, limited access (the Coca Cola formula). He also notes some areas where encryption cannot help: theft of plaintext copies, unauthorized use of terminals after the establishment of communications, physical destruction of encrypted data, modification of software that manipulates encrypted data, and fraud or theft by authorized users.

To repeat, this is a four-page primer, an overview, for the novice.

Reviewer:  G. G. Early Review #: CR109236

Reproduction in whole or in part without permission is prohibited.   Copyright 2024 ComputingReviews.com™
Terms of Use
| Privacy Policy