skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 114158 Find in a Library
Title: Encryption: Securing With Ciphers
Journal: Security Management  Volume:32  Issue:10  Dated:(October 1988)  Pages:45-47
Author(s): S N Kesim
Date Published: 1988
Page Count: 3
Type: Issue Overview
Format: Article
Language: English
Country: United States of America
Annotation: Encryption -- changing information into unreadable ciphers -- provides a mean for increasing computer security and privacy.
Abstract: The most secure cipher was invented in 1917 and is used to protect the Washington-Moscow hotline. One of the best known ciphers, Lucifer, was made into the official data encryption standard by the National Bureau of Standards. Encryption is now used by individuals and businesses to protect confidential information. Increased compatibility between home and office computers increases security needs. Businesses use encryption to adhere to government regulation; protect research and development, commercial, and other proprietary data; and deter unauthorized access to information by employees or competitors. The incidence of computer crime can be reduced and data can be made less vulnerable through the use of encryption, password protection, and regular employee security checks. Factors determining the strength of a decryption cipher include the length of the key, the formula or table used, its adaptability to other applications, and coding/decoding speed. The security of ciphers can be increased in many ways. Files containing blanks, leading or trailing zeros, and repetitive sequences should be compressed. The key or password should have eight or more characters and consist of random letters and numbers. During transmission, files should be segmented, and garbage characters should be transmitted between real files to create a constant stream of data. For higher security levels, files should be encrypted more than once, and they should be encoded and decoded sequentially. Keys should be securely stored and changed frequently. 3 references.
Main Term(s): Encryption
Index Term(s): Computer crime prevention measures; Computer privacy and security; Personnel identification systems
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.