The IPS Cryptographic Programs

نویسندگان

  • Alan G. Konheim
  • Marian H. Mack
  • Robert K. McNeill
  • Bryant Tuckerman
  • Gerald Waldbaum
چکیده

portance as computers have become faster and as strong cryptographic algorithms, such as the Data Encryption Standard (DES) , have become available. But a standard encipherment technique is only the j r s t step in applying cryptography in a computing center. This paper discusses the Information Protection System (IPS), a set of cryptographic application programs designed to use the DES algorithm in a working computing center. In designing IPS, several important augmentations of DES were formulated. IPS was first implemented to help increase computing-center security at the IBM Thomas J . Watson Research Center and is now widely installed at other IBM locations. IPS is not an IBM product and is not available for use outside IBM, but many cryptographic techniques in IPS were incorporated into the IBM cryptographic products announced in 1977.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Predictive validity of the Individual Placement and Support fidelity scale (IPS-25): A replication study

BACKGROUND: Fidelity scales are used to monitor adherence to evidence-based practices. The underlying assumption is that high fidelity predicts better outcomes. The IPS-25 is a fidelity scale measuring adherence to the Individual Placement and Support (IPS) model. A previous study found a significant association between the IPS-25 and competitive employment outcome. The current study sought to ...

متن کامل

The Strength of Multi-row Aggregation Cuts for Sign-pattern Integer Programs

In this paper, we study the strength of aggregation cuts for sign-pattern integer programs (IPs). Sign-pattern IPs are a generalization of packing IPs and are of the form {x ∈ Z+ | Ax ≤ b} where for a given column j, Aij is either non-negative for all i or non-positive for all i. Our first result is that the aggregation closure for such sign-pattern IPs can be 2-approximated by the original 1-r...

متن کامل

Design of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method

Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...

متن کامل

IPS-2: the second generation of a parallel program measurement system - Parallel and Distributed Systems, IEEE Transactions on

IPS is a performance measurement system for parallel and distributed programs. IPS’S model of parallel programs uses knowledge about the semantics of a program’s structure to provide two important features. First, IPS provides a large amount of performance data about the execution of a parallel program, and this information is organized so that access to it is easy and intuitive. Second, IPS pr...

متن کامل

IPS-2: The Second Generation of a Parallel Program Measurement System

IPS is a performance measurement system for parallel and distributed programs. IPS’s model of parallel programs uses knowledge about the semantics of a program’s structure to provide two important features. First, IPS provides a large amount of performance data about the execution of a parallel program, and this information is organized so that access to it is easy and intuitive. Second, IPS pr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IBM Systems Journal

دوره 19  شماره 

صفحات  -

تاریخ انتشار 1980