The IPS Cryptographic Programs
نویسندگان
چکیده
portance as computers have become faster and as strong cryptographic algorithms, such as the Data Encryption Standard (DES) , have become available. But a standard encipherment technique is only the j r s t step in applying cryptography in a computing center. This paper discusses the Information Protection System (IPS), a set of cryptographic application programs designed to use the DES algorithm in a working computing center. In designing IPS, several important augmentations of DES were formulated. IPS was first implemented to help increase computing-center security at the IBM Thomas J . Watson Research Center and is now widely installed at other IBM locations. IPS is not an IBM product and is not available for use outside IBM, but many cryptographic techniques in IPS were incorporated into the IBM cryptographic products announced in 1977.
منابع مشابه
Predictive validity of the Individual Placement and Support fidelity scale (IPS-25): A replication study
BACKGROUND: Fidelity scales are used to monitor adherence to evidence-based practices. The underlying assumption is that high fidelity predicts better outcomes. The IPS-25 is a fidelity scale measuring adherence to the Individual Placement and Support (IPS) model. A previous study found a significant association between the IPS-25 and competitive employment outcome. The current study sought to ...
متن کاملThe Strength of Multi-row Aggregation Cuts for Sign-pattern Integer Programs
In this paper, we study the strength of aggregation cuts for sign-pattern integer programs (IPs). Sign-pattern IPs are a generalization of packing IPs and are of the form {x ∈ Z+ | Ax ≤ b} where for a given column j, Aij is either non-negative for all i or non-positive for all i. Our first result is that the aggregation closure for such sign-pattern IPs can be 2-approximated by the original 1-r...
متن کاملDesign of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method
Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...
متن کاملIPS-2: the second generation of a parallel program measurement system - Parallel and Distributed Systems, IEEE Transactions on
IPS is a performance measurement system for parallel and distributed programs. IPS’S model of parallel programs uses knowledge about the semantics of a program’s structure to provide two important features. First, IPS provides a large amount of performance data about the execution of a parallel program, and this information is organized so that access to it is easy and intuitive. Second, IPS pr...
متن کاملIPS-2: The Second Generation of a Parallel Program Measurement System
IPS is a performance measurement system for parallel and distributed programs. IPS’s model of parallel programs uses knowledge about the semantics of a program’s structure to provide two important features. First, IPS provides a large amount of performance data about the execution of a parallel program, and this information is organized so that access to it is easy and intuitive. Second, IPS pr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IBM Systems Journal
دوره 19 شماره
صفحات -
تاریخ انتشار 1980