Abstract
The problem which is addressed in this paper is to study the public key data protection (privacy, integrity and signatures) of an existing electronic mail and document handling system. This is not a trivial and straightforward problem since the protocols have to be tailored to the user’s needs and since many trade-offs are involved between speed, security and ease of use. Moreover the final security of the overall system not only depends on the choice of the cryptographic algorithm, but also on the communication protocol, the key management and their implementation (physical security and computer security). In other words the security is a property of the whole system [3]. Although many of the arguments described in the paper are rather system dependent, it is expected that the approaches taken here are valuable for other applications too. The readers are however cautioned not to transfer the conclusions blindly.
Supported by the Services of the Prime Minister of Belgium under the BISTEL projekt.
Part of this text has been elaborated within the framework of the belgian programme for the reinforcement of the scientific potential in the new technologies — PREST (Prime Minister’s Office for Science Policy). The scientific responsibility for the text is assumed by its authors.
Chapter PDF
References
ISO, “Public key cryptosystem and mode of use, Annual report 1984”, Report ISO/TC 97/SC 2O/WG 2 N, Dec. 1984.
S. Weinstein, “Smart credit cards; the answer to cashless shopping”, IEEE Spectrum, Vol. 21, no2, pp.43–49, Febr. 1984.
D. Davies and W. Price, “Engineering secure information systems,” Proc. Eurocr.1985.
D.E. Denning, “Cryptography and data security,” Addison-Wesley, Reading, 1982
D. Chaum, “Untracable electronic mail, return addresses, and digital pseudonyms”, Comm. ACM, Vol. 24, pp. 84–88, Febr. 1981.
R.L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public key cryptosystems,” Comm. ACM, Vol. 21, pp. 294–299, April 1978.
R. Merkle and M. Hellman, “Hiding information and signatures in trapdoor knapsacks”, IEEE Trans. Inform. Theory, Vol. 24, pp. 525–530, Sept. 1978.
Y. Desmedt, J. Vandewalle, and R. Govaerts, “A general public key cryptographic knapsack algorithm based on linear algebra”, IEEE Proc ISIT, pp. 129–130, 1980.
Davis J.A., Holdridge D.B., Simmons G.J., “Status Report on factoring”, Sandia National Laboratories 1–33, 1984.
S. Serpell, C. Brookson, B. Clark, “A prototype encryption system using public key”, Proc. Crypto 84.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1986 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Vandewalle, J., Govaerts, R., De Becker, W., Decroos, M. (1986). Implementation Study of Public Key Cryptographic Protection in an Existing Electronic Mail and Document Handling System. In: Pichler, F. (eds) Advances in Cryptology — EUROCRYPT’ 85. EUROCRYPT 1985. Lecture Notes in Computer Science, vol 219. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-39805-8_6
Download citation
DOI: https://doi.org/10.1007/3-540-39805-8_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-16468-5
Online ISBN: 978-3-540-39805-9
eBook Packages: Springer Book Archive