Multi-grade cryptography

نویسنده

  • Ronald L. Rivest
چکیده

The recent development of powerful cryptographic techniques has caused a number of public policy issues to become significant. The three most prominent issues are (1) export control, (2) key escrow, and (3) anonymity. These represent tradeoffs between different societal objectives: (1) commerce/national-security and (2,3) privacy/law-enforcement. Some discussion of cryptographic policy issues can be found in Hoffman[3]. While the rapid development of cryptography is likely to make attempts to control it ultimately futile, it is interesting to see what technical possibilities there are for supporting compromise positions in each such trade-off. This paper presents a new paradigm for secret-key cryptography that may be useful for export control (and perhaps also for law-enforcement). We call it multi-grade cryptography because it makes a single cryptosystem appear to present multiple levels of security. It is not based on key-escrow, but rather on computational complexity.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

توصیف تجارب و ادراک معلمان و کارشناسان از آموزش در کلاس‌های چندپایه دوره ابتدایی مناطق روستایی کلیبر

The main Purpose of this Study is to Describing Teachers and experts’ perception and experiences of status Multi-grade Classroom and education in, Multi-grade Classroom Students Problems and Multi-grade Classroom Teachers problems in primary schools Multi-grade Classroom in Caliber Villages. The quality and phenomenology Method has Implicated In this Study. The statistic population with contain...

متن کامل

An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms

Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...

متن کامل

Implementing High Grade Security in Cloud Application using Multifactor Authentication and Cryptography

As a high-speed internet foundation is being developed and people are informationized, most of the tasks are engaged in internet field so there is a risk that any private data like personal information or applications for managing money can be wiretapped or eavesdropped. The consolidation of One Time Passwords (OTPs) and Hash encryption algorithms are used to evolve a more secured password-prot...

متن کامل

The effect of flipped class approach on math learning of students in multi-grade classes

The purpose of this study was to investigate the effect of the flipped class approach on math learning of students in multi-grade classes. This research is a quasi-experimental design of pre-test-post-test-follow-up with a control group. After studying and designing educational work, 36 elementary school students studying in two multi-level schools in the academic year 1300-1400 in Kohgiluyeh a...

متن کامل

The effect of flipped class approach on math learning of students in multi-grade classes

The purpose of this study was to investigate the effect of the flipped class approach on math learning of students in multi-grade classes. This research is a quasi-experimental design of pre-test-post-test-follow-up with a control group. After studying and designing educational work, 36 elementary school students studying in two multi-level schools in the academic year 1300-1400 in Kohgiluyeh a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1995