Cryptography and records management
Abstract
Cryptography and related terminology is defined. The design and operation of an encryption algorithm is examined in detail, using the example of DES (Data Encryption Standard). Public key cryptosystems based on the Diffie‐Hellman and RSA (Rivest, Shamir and Adleman) models are described and their revolutionary nature made clear. The necessity for trusted public keys with RSA is explained. Applications in records management are given in sections on storage and transmission. The latter type further breaks down into mail and file transfer/EDI (Electronic Data Interchange) areas of use. Some novel applications are proposed (for example a virtual records centre). A conclusion argues that although the law has yet to catch up with developments in cryptography, when it does cryptography will be central to electronic file management.
Citation
POULTER, A. (1996), "Cryptography and records management", Records Management Journal, Vol. 6 No. 2, pp. 83-92. https://doi.org/10.1108/eb027089
Publisher
:MCB UP Ltd
Copyright © 1996, MCB UP Limited