Paper
12 March 1996 Token-based information security for commercial and federal information networks
William S. Rohland
Author Affiliations +
Proceedings Volume 2616, Information Protection and Network Security; (1996) https://doi.org/10.1117/12.232257
Event: Photonics East '95, 1995, Philadelphia, PA, United States
Abstract
The planning of cryptographic solutions for messaging and electronic commerce applications in the United States during the past few years has been motivated by a high level of interest in the technology on the part of potential users. It has been marked by a high level of controversy over algorithms, patent rights and escrow policy. The diverse needs of the government and commercial sectors have led to mutually exclusive solutions based on different algorithms and policy; this phenomenon is fairly unique to the United States. Because of the strong requirement to preserve the differences that make these solutions unique for the two environments, the near-term evolution of a single standard appears unlikely. Furthermore, the need on the part of some government agencies and some commercial establishments exists to operate in both environments. This paper deals with the technical definition and design approach to a dual-use cryptographic device and the migration paths to the dual-use device from both environments. Such a device is further considered as a component of a secure cryptographic translation facility.
© (1996) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
William S. Rohland "Token-based information security for commercial and federal information networks", Proc. SPIE 2616, Information Protection and Network Security, (12 March 1996); https://doi.org/10.1117/12.232257
Lens.org Logo
CITATIONS
Cited by 1 scholarly publication.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Standards development

Algorithm development

Computing systems

Information security

Decision support systems

Biometrics

Computer security

Back to Top