jkimble@crash.CTS.COM (Jim Kimble) (07/07/87)
Here's that information I promised a long time ago, but never got around to sending. I was suddenly over-wealmed by guilt and a lot of free time. Enjoy. --Jim Kimble jkimble@crash.cts.com Encryption: technology, privacy, and national security. (confidentiality of electronic communications) by Tom Athanasiou il Technology Review v85-Aug-Sep 1986, p56(10) Can the world agree on the next digital-speech coding algorithm? (voiceband codig standization) defferential pulse-code modulation) by William G. Schmidt il Data Communications v15-July 1986 p157(6) Four sime encryption techniques help ensure data integrity. By Louis R. Mills il Data Management v22-Dec 1984 p22(2) Data-encoding technique boosts drive capacity (data disk drives; includes article on data-encoding methods) by Steve Rosenthal PC Week v3-May 20, 1986 The destiny of DES (data encryption standard) by Robert G. Andersen il Datamation v33-March 1 1987 Encryption: technology, privacy, and national security (confidentiality of electronic communications) by Tom Athanasiou il Technology Review v89-Aug-Sept 1986 p56(10) Uncommon factoring; new computing machines and new algorithms are speeding up the factoring of large numbers. By Ivars Peterson il Science News v127-March 30, 1985 p202(2) Shredded knapsack (cryptography innovations) Scientific American v252-Jan 1985 p56(2) Scientist cracks knapsack public key code. By John Desmond ComputerWorld v18-Dec 3, 1984 p2(1) The unpacking of a knapsack (encrypted messages based on a mathematical puzzle) by Ivars Peterson il Science News v126-Nov 24, 1984 p330(2) Implementing cryptographic algorithms on microcomputers; create up to 200-digit keys. By Charles Klupfel Byte v9-Oct 1984 p126(11) The ciphers of Edgar Allan Poe. (deciphering coded messages) il Science Digest v92-Oct 1984 p62(4) Encryption decyphered; oding locks your data away frm anyone not possessing te key. By Carl Micolai il Computers & Electronics v22-June 1984 p64(5) Keeping electronic mail private. By Vin McLellan il Inc. v6-April 1984 p37(3) Deciphering word games; two Basic programs that will help you solve cryptograms nd anagrams. By Mark C. Worlay Byte v9-Feb 1984 p383(3) Nongovernmental cryptology and national security: the government seeking to restrict research. By Christy Brad Escober Computer-Law Journal 4-Wntr-1984 p573-603 (DECODERS AND OTHER RELATED STUFF) Build a hardware data encryptor (cpmputer data security) by Steve Ciarcia il Byte v11-Sept 1986 p97(15) Decoders in use up to 41% (scrambling decoders) Television Digest v26-Nov 1986 p5(1) French pay-TV Company loses decoder suit, OK to steal signal. By Bob Jaques Variety v326-March. 'Superchips' in decoder black market. Television Digest v26-Dec 22, 1986 p3(1). PUBLIC Key Encryption System, v2.00 (computer program) Three products help cork computer leaks; feature blocked access, disk-file encryption. (evaluation) by Winn Rosche. PC Week v2-May 7, 1985. p122(3) --Jim Kimble "We can do that. We don't even need a reason." -- Bill Murray, Caddyshack UUCP: {akgua, hplabs!hp-sdd, sdcsvax, nosc}!crash!jkimble ARPA: crash!jkimble@nosc INET: jkimble@crash.CTS.COM