DATA encryption, COMPUTER files, COMPUTER security, FILES (Records), CRYPTOGRAPHY, COMPUTERS
Abstract
Cryptographic techniques which can be used to maintain the confidentiality of information processed by computers are dealt with. Special emphasis is paid to the unique characteristics of computer files that make many cryptographic methods of little use. Relative security, costs, and preferred methods are included in this paper. [ABSTRACT FROM AUTHOR]
Discusses a procedure to ensure the security of time sharing systems from unauthorized users. Use of a password for the security of the log-in procedure; Application of one-way ciphers to code the passwords; Superiority of polynomials over prime modulus.
PUNCHED card systems, PROGRAMMING languages, CIPHERS, COMPUTER programming, INFORMATION storage & retrieval systems, COMPUTER science, ELECTRONIC data processing, CHARTS, diagrams, etc.
Abstract
The article reports on the correspondences of hollerith and 8-bit codes for computer environment. It solicits the comment that refers to the assignments of character(s) sets in the provided table as a basis for standardization. Hollerith is the name given to the 128-character, 12-row card code called USA Standard Hollerith Punched Card Code for Information Interchange. In relation, the USA Standard Code for Information Interchange's (USASCII) standard code assignment as well as other codes several correspondence tables are reflected.