There are three widely held beliefs about cryptology which underpin much research on the subject, guide substantial industrial investment and inform most of the associated public policy debate. These are, first,that the cryptographic systems are mostly used to keep communications secure, in the sense of ensuring that an electronic message is secret and/or authentic. In the second of these roles, cryptology provides a useful (if not only) means of securing electronic evidence in such a way that it will be accepted by a court, and is thus indispensable to the future development of electronic commerce. Third, most attacks on cryptographic systems involve technical skill at cryptanalysis, and such systems can therefore be made sufficiently robust by using standard,well studied encryption and signature algorithms. Shows that these three beliefs are almost completely mistaken.
Article navigation
1 December 1994
This article was originally published in
Information Management & Computer Security
Research Article|
December 01 1994
Whither Cryptography Available to Purchase
Ross J. Anderson
Ross J. Anderson
Computer Laboratory, University of Cambridge, UK.
Search for other works by this author on:
Publisher: Emerald Publishing
Online ISSN: 1758-5805
Print ISSN: 0968-5227
© MCB UP Limited
1994
Information Management & Computer Security (1994) 2 (5): 13–20.
Citation
Anderson RJ (1994), "Whither Cryptography". Information Management & Computer Security, Vol. 2 No. 5 pp. 13–20, doi: https://doi.org/10.1108/09685229410792961
Download citation file:
196
Views
Suggested Reading
A generic service model for secure data interchange
Industrial Management & Data Systems (June,2005)
The evaluation and certification of information security against BS 7799
Information Management & Computer Security (May,1998)
Authentication: A Prominent Issue for Data Communications
Information Management & Computer Security (March,1994)
Body language, security and e‐commerce
Library Hi Tech (March,2000)
EDI Security Issues Can Be Overcome
Information Management & Computer Security (August,1994)
Related Chapters
Digital Conflicts in Production and Planning
Conflict Management in Digital Business: New Strategy and Approach
Data Management and Analytics in Finance
Strategic Financial Management: A Managerial Approach
Cybersecurity and Ensuring Privacy in Digital Finance
Digital Finance and Metaverse in Banking: Decoding a Virtual Reality towards Financial Inclusion and Sustainable Development
Recommended for you
These recommendations are informed by your reading behaviors and indicated interests.
