Issues 94—public key—trials and tribulations

  • Authors:
  • Harvey H. Rubinovitz

  • Affiliations:
  • -

  • Venue:
  • ACM SIGSAC Review - Special issue: Issues 94 workshop on public key cryptography
  • Year:
  • 1995

Quantified Score

Hi-index 0.00

Visualization

Abstract

This document was written based on the introductory talk presented at the special workshop, "Issue 94 - Public Key - Trials and Tribulations" in conjunction with the Tenth Annual Computer Security Applications Conference held in December 1994. This document serves to set the stage for the papers which follow and to provide a catalyst to discussions at the conference. Applications which utilize public key technology to enhance security are just starting to emerge. Some applications are starting to use digital signatures to insure authenticity, integrity, and nonrepudiation between sender and receiver. There are applications which allow users to sign forms of Electronic Data Interchange (EDI) transactions digitally. A number of approaches to secure electronic mail such as privacy-enhanced E-mail (PEM) implementations, Pretty Good Privacy (PGP), and Message Security Protocol (MSP) have been defined. The focus of the workshop was to discuss the implementation, deployment, and management experiences of various applications utilizing Public Key systems. These topics are discussed briefly in this paper and are discussed in more detail in the additional papers which were presented at the special workshop.