Cryptography for the Internet
E-mail and other types of information sent electronically usually aren't that secure. Well-designed cryptography can make these electronic transmissions much more safe.
Gespeichert in:
Veröffentlicht in: | Scientific American 1998-10, Vol.279 (4), p.110-115 |
---|---|
1. Verfasser: | |
Format: | Magazinearticle |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 115 |
---|---|
container_issue | 4 |
container_start_page | 110 |
container_title | Scientific American |
container_volume | 279 |
creator | Zimmermann, Philip R. |
description | E-mail and other types of information sent electronically usually aren't that secure. Well-designed cryptography can make these electronic transmissions much more safe. |
doi_str_mv | 10.1038/scientificamerican1098-110 |
format | Magazinearticle |
fullrecord | <record><control><sourceid>jstor_proqu</sourceid><recordid>TN_cdi_proquest_miscellaneous_223258872</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><jstor_id>26057991</jstor_id><sourcerecordid>26057991</sourcerecordid><originalsourceid>FETCH-LOGICAL-c247t-459dd08b41847793fd008ab18687114646f3ae161521b02c8b4615bfd8f032393</originalsourceid><addsrcrecordid>eNptkD1PwzAQhi0EEqHwEypVLEyBO9vxBxuqKFSqxAKz5SQ2TdUmwXaH_nuMgpi44e4dnveGh5BbhHsEph5i07k-db5r7MGFvHsErUpEOCMFai5KCUqekwKAiVJJxi7JVYw7yEMFFGS-DKcxDZ_BjtvTwg9hkbZuse6TC71L1-TC2310N793Rj5Wz-_L13Lz9rJePm3KhnKZSl7ptgVVc1RcSs18C6BsjUooicgFF55ZhwIrijXQJpM5175VHhhlms3I3fR3DMPX0cVkDl1s3H5vezcco6GU0UopSTP5OJFNGGIMzpsxdAcbTgbB_Cgx_ysxWUkuz6fyLqYh_DWziEpqjewbCThiMQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>magazinearticle</recordtype><pqid>223258872</pqid></control><display><type>magazinearticle</type><title>Cryptography for the Internet</title><source>Jstor Complete Legacy</source><creator>Zimmermann, Philip R.</creator><creatorcontrib>Zimmermann, Philip R.</creatorcontrib><description>E-mail and other types of information sent electronically usually aren't that secure. Well-designed cryptography can make these electronic transmissions much more safe.</description><identifier>ISSN: 0036-8733</identifier><identifier>EISSN: 1946-7087</identifier><identifier>DOI: 10.1038/scientificamerican1098-110</identifier><identifier>CODEN: SCAMAC</identifier><language>eng</language><publisher>New York: Scientific American, Incorporated</publisher><subject>Algorithms ; Ciphers ; Ciphertexts ; Cryptanalysis ; Cryptography ; Cryptosystems ; Data encryption ; Data transmission ; Electronic mail systems ; Internet ; Public key cryptography ; SPECIAL REPORT: Computer Security and the Internet ; Technology</subject><ispartof>Scientific American, 1998-10, Vol.279 (4), p.110-115</ispartof><rights>Copyright Scientific American, Incorporated Oct 1998</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c247t-459dd08b41847793fd008ab18687114646f3ae161521b02c8b4615bfd8f032393</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.jstor.org/stable/pdf/26057991$$EPDF$$P50$$Gjstor$$H</linktopdf><linktohtml>$$Uhttps://www.jstor.org/stable/26057991$$EHTML$$P50$$Gjstor$$H</linktohtml><link.rule.ids>776,780,799,27902,57992,58225</link.rule.ids></links><search><creatorcontrib>Zimmermann, Philip R.</creatorcontrib><title>Cryptography for the Internet</title><title>Scientific American</title><description>E-mail and other types of information sent electronically usually aren't that secure. Well-designed cryptography can make these electronic transmissions much more safe.</description><subject>Algorithms</subject><subject>Ciphers</subject><subject>Ciphertexts</subject><subject>Cryptanalysis</subject><subject>Cryptography</subject><subject>Cryptosystems</subject><subject>Data encryption</subject><subject>Data transmission</subject><subject>Electronic mail systems</subject><subject>Internet</subject><subject>Public key cryptography</subject><subject>SPECIAL REPORT: Computer Security and the Internet</subject><subject>Technology</subject><issn>0036-8733</issn><issn>1946-7087</issn><fulltext>true</fulltext><rsrctype>magazinearticle</rsrctype><creationdate>1998</creationdate><recordtype>magazinearticle</recordtype><recordid>eNptkD1PwzAQhi0EEqHwEypVLEyBO9vxBxuqKFSqxAKz5SQ2TdUmwXaH_nuMgpi44e4dnveGh5BbhHsEph5i07k-db5r7MGFvHsErUpEOCMFai5KCUqekwKAiVJJxi7JVYw7yEMFFGS-DKcxDZ_BjtvTwg9hkbZuse6TC71L1-TC2310N793Rj5Wz-_L13Lz9rJePm3KhnKZSl7ptgVVc1RcSs18C6BsjUooicgFF55ZhwIrijXQJpM5175VHhhlms3I3fR3DMPX0cVkDl1s3H5vezcco6GU0UopSTP5OJFNGGIMzpsxdAcbTgbB_Cgx_ysxWUkuz6fyLqYh_DWziEpqjewbCThiMQ</recordid><startdate>19981001</startdate><enddate>19981001</enddate><creator>Zimmermann, Philip R.</creator><general>Scientific American, Incorporated</general><scope>AAYXX</scope><scope>CITATION</scope><scope>NAPCQ</scope></search><sort><creationdate>19981001</creationdate><title>Cryptography for the Internet</title><author>Zimmermann, Philip R.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c247t-459dd08b41847793fd008ab18687114646f3ae161521b02c8b4615bfd8f032393</frbrgroupid><rsrctype>magazinearticle</rsrctype><prefilter>magazinearticle</prefilter><language>eng</language><creationdate>1998</creationdate><topic>Algorithms</topic><topic>Ciphers</topic><topic>Ciphertexts</topic><topic>Cryptanalysis</topic><topic>Cryptography</topic><topic>Cryptosystems</topic><topic>Data encryption</topic><topic>Data transmission</topic><topic>Electronic mail systems</topic><topic>Internet</topic><topic>Public key cryptography</topic><topic>SPECIAL REPORT: Computer Security and the Internet</topic><topic>Technology</topic><toplevel>online_resources</toplevel><creatorcontrib>Zimmermann, Philip R.</creatorcontrib><collection>CrossRef</collection><collection>Nursing & Allied Health Premium</collection><jtitle>Scientific American</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Zimmermann, Philip R.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Cryptography for the Internet</atitle><jtitle>Scientific American</jtitle><date>1998-10-01</date><risdate>1998</risdate><volume>279</volume><issue>4</issue><spage>110</spage><epage>115</epage><pages>110-115</pages><issn>0036-8733</issn><eissn>1946-7087</eissn><coden>SCAMAC</coden><abstract>E-mail and other types of information sent electronically usually aren't that secure. Well-designed cryptography can make these electronic transmissions much more safe.</abstract><cop>New York</cop><pub>Scientific American, Incorporated</pub><doi>10.1038/scientificamerican1098-110</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0036-8733 |
ispartof | Scientific American, 1998-10, Vol.279 (4), p.110-115 |
issn | 0036-8733 1946-7087 |
language | eng |
recordid | cdi_proquest_miscellaneous_223258872 |
source | Jstor Complete Legacy |
subjects | Algorithms Ciphers Ciphertexts Cryptanalysis Cryptography Cryptosystems Data encryption Data transmission Electronic mail systems Internet Public key cryptography SPECIAL REPORT: Computer Security and the Internet Technology |
title | Cryptography for the Internet |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-10T13%3A51%3A28IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-jstor_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Cryptography%20for%20the%20Internet&rft.jtitle=Scientific%20American&rft.au=Zimmermann,%20Philip%20R.&rft.date=1998-10-01&rft.volume=279&rft.issue=4&rft.spage=110&rft.epage=115&rft.pages=110-115&rft.issn=0036-8733&rft.eissn=1946-7087&rft.coden=SCAMAC&rft_id=info:doi/10.1038/scientificamerican1098-110&rft_dat=%3Cjstor_proqu%3E26057991%3C/jstor_proqu%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=223258872&rft_id=info:pmid/&rft_jstor_id=26057991&rfr_iscdi=true |