A Method for Obtaining Digital Signatures and Public-Key Cryptosystems in Communications of the ACM 21 pp. 120-126, 1978 [RSA encryption method]

1978. 1st Edition. The encryption method described in this paper, famously known as "RSA" for the names of its authors, is widely used for secure data transmission. It has been cited more than 21,000 times. Other papers of import are included; see below.

“An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key. This has two important consequences: (1) Couriers or other secure means are not needed to transmit keys, since a message can be enciphered using an encryption key publicly revealed by the intented recipient. Only he can decipher the message, since only he knows the corresponding decryption key. (2) A message can be “signed” using a privately held decryption key. Anyone can verify this signature using the corresponding publicly revealed encryption key. Signatures cannot be forged, and a signer cannot later deny the validity of his signature. This has obvious applications in ‘electronic mail’ and ‘electronic funds transfer’ systems” (Rivest et al., 120, 1928).

ALSO INCLUDED: The first issue in this volume also contains a number of other important papers including these two: "The CRAY-1 Computer System" by D. W. Clark and W. D. Strecker and "Architecture of the IBM System/370" by Richard P. Case and Andris Padegs (pp. 63-72 and 73-96). The Cray-1, designed by Seymour Cray, was one of the most successful supercomputers ever built. The IBM/370 was IBM's leading computer system for 20 years. Item #1495

CONDITION & DETAILS: Full volume. Fine condition with no markings.

Price: $400.00