[sci.crypt] Encryption -- Things Your Mother Never Told You

jkimble@crash.CTS.COM (Jim Kimble) (07/07/87)

Here's that information I promised a long time ago, but never got around
to sending. I was suddenly over-wealmed by guilt and a lot of free time.

Enjoy.

--Jim Kimble
jkimble@crash.cts.com

Encryption: technology, privacy, and national security. (confidentiality of
electronic communications) by Tom Athanasiou  il  Technology Review
v85-Aug-Sep 1986, p56(10)

Can the world agree on the next digital-speech coding algorithm? (voiceband
codig standization) defferential pulse-code modulation) by William G. Schmidt
il  Data Communications v15-July 1986 p157(6)

Four sime encryption techniques help ensure data integrity. By Louis R. Mills
il  Data Management v22-Dec 1984 p22(2)

Data-encoding technique boosts drive capacity (data disk drives; includes
article on data-encoding methods) by Steve Rosenthal  PC Week v3-May 20, 1986

The destiny of DES (data encryption standard) by Robert G. Andersen  il
Datamation v33-March 1 1987

Encryption: technology, privacy, and national security (confidentiality of
electronic communications) by Tom Athanasiou  il  Technology Review
v89-Aug-Sept 1986  p56(10)

Uncommon factoring; new computing machines and new algorithms are speeding up
the factoring of large numbers. By Ivars Peterson  il  Science News v127-March
30, 1985 p202(2)

Shredded knapsack (cryptography innovations) Scientific American v252-Jan 1985
p56(2)

Scientist cracks knapsack public key code. By John Desmond  ComputerWorld
v18-Dec 3, 1984 p2(1)

The unpacking of a knapsack (encrypted messages based on a mathematical
puzzle)
by Ivars Peterson  il  Science News v126-Nov 24, 1984 p330(2)

Implementing cryptographic algorithms on microcomputers; create up to
200-digit
keys. By Charles Klupfel  Byte  v9-Oct 1984 p126(11)

The ciphers of Edgar Allan Poe. (deciphering coded messages)  il  Science
Digest  v92-Oct 1984 p62(4)

Encryption decyphered; oding locks your data away frm anyone not possessing
te key. By Carl Micolai  il  Computers & Electronics v22-June 1984 p64(5)

Keeping electronic mail private. By Vin McLellan  il  Inc. v6-April 1984
p37(3)

Deciphering word games; two Basic programs that will help you solve
cryptograms
nd anagrams. By Mark C. Worlay  Byte  v9-Feb 1984 p383(3)

Nongovernmental cryptology and national security: the government seeking to
restrict research. By Christy Brad Escober  Computer-Law Journal 4-Wntr-1984
p573-603

(DECODERS AND OTHER RELATED STUFF)

Build a hardware data encryptor (cpmputer data security) by Steve Ciarcia  il
Byte v11-Sept 1986 p97(15)

Decoders in use up to 41% (scrambling decoders) Television Digest v26-Nov 1986
p5(1)

French pay-TV Company loses decoder suit, OK to steal signal. By Bob Jaques
Variety  v326-March.

'Superchips' in decoder black market. Television Digest v26-Dec 22, 1986
p3(1).

PUBLIC Key Encryption System, v2.00 (computer program)

Three products help cork computer leaks; feature blocked access, disk-file
encryption. (evaluation) by Winn Rosche. PC Week v2-May 7, 1985. p122(3)

--Jim Kimble

"We can do that. We don't even need a reason." -- Bill Murray, Caddyshack

UUCP: {akgua, hplabs!hp-sdd, sdcsvax, nosc}!crash!jkimble

ARPA: crash!jkimble@nosc

INET: jkimble@crash.CTS.COM