Abstracts - faqs.org

Abstracts

Science and technology

Search abstracts:
Abstracts » Science and technology

The case against regulating encryption technology: one of the pioneers of computer security says the U.S. government should keep its hand off cryptography

Article Abstract:

Regulating encryption technology over national security issues is a weak argument for its widespread use to protect data transmission. The strong growth of strong encryption technology would soon be a force enough for its adoption in business and industry that regulation would be hard to justify.

Author: Rivest, Ronald Linn
Publisher: Scientific American, Inc.
Publication Name: Scientific American
Subject: Science and technology
ISSN: 0036-8733
Year: 1998
Political aspects, Data security

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Quantum cryptography

Article Abstract:

Quantum techniques have been used to develop a system that allows two parties to exchange information in absolute secrecy. Quantum cryptographic devices use individual photons of light and Heisenberg's uncertainty principle. Eavesdropping causes a disturbance that alerts the legitimate parties.

Author: Bennett, Charles H., Brassard, Gilles, Ekert, Artur K.
Publisher: Scientific American, Inc.
Publication Name: Scientific American
Subject: Science and technology
ISSN: 0036-8733
Year: 1992
Usage, Innovations, Quantum theory, Quantum mechanics, Cryptography

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Bad timing: a loophole is found in a popular encryption scheme

Article Abstract:

Cryptography consultant Paul C. Kocher has discovered that public-key encryption can be solved by timing how long a computer takes to decipher messages. Timing allows a hacker to identify the public key used to encrypt messages.

Author: Seife, Charles
Publisher: Scientific American, Inc.
Publication Name: Scientific American
Subject: Science and technology
ISSN: 0036-8733
Year: 1996
Research, Public key encryption

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Subjects list: Data encryption
Similar abstracts:
  • Abstracts: A method for calculating bacterial deposition coefficients using the fraction of bacteria recovered from laboratory columns
  • Abstracts: Information networks and competitive advantage: issues for government policy and corporate strategy
  • Abstracts: A gamut of groups; mutations, knots and parliaments are terms for some of the creatures that like hanging out together
  • Abstracts: TQM at Xerox: lessons worth duplicating. Requirements for successful implementation of total quality management
  • Abstracts: The end or the means: programs or basics. An examination of organization and suborganization readiness for total quality management
This website is not affiliated with document authors or copyright owners. This page is provided for informational purposes only. Unintentional errors are possible.
Some parts © 2025 Advameg, Inc.