Fingers Crossed for 2021 ...

2020 was the worst! COVID kept the museum closed for much of the year and a mains water pipe bursting causing a flood kept us closed for the rest. 
We're hoping to re-open in the next few months ... fingers crossed! Read More >>>

Please Donate Via Just GivingNo visitors, no workshops, no events, no school visits... no income. We know that things are tough for everyone right now, but if you can afford to help us through these tough times please donate what you can.

There's over 36,000 exhibits here! That should keep you occupied for a bit - get searching!

Or come and get involved on our social media channels ...

      Twitch  Facebook          Online Gift Shop      

Thank you.

Data Security Through Cryptography

From the preface:
'The purpose of this manual is to describe cryptography and the role it plays in the data security of a system installation.

The subject matter is discussed at a high level; the details about some of the topics mentioned in this manual are found in the appropriate document listed under "Related Publications."

The reader is assumed to have an elementary knowledge of data processing concepts and techniques, the IBM System/360. IBM System/370, and teleprocessing.

Note: The concepts and techniques discussed in this manual are simply an exploration of some of the ways cryptography may be used in data security. The presentation of such concepts and techniques is not intended to imply that such concepts and techniques arc or will be implemented in IBM products.'
38 Pages.

This document has recently been digitised and made available here. Digitising our collections requires significant resources. Please consider making a donation to the Centre if you download this document!  The donate button is at the top of this page, by the search bar.

Reference Number : GC22-9062-0

Date Published : October 1977

Manufacturer : IBM

Format : PDF






This exhibit has a reference ID of CH10749. Please quote this reference ID in any communication with the Centre for Computing History.

Data Security Through Cryptography

Click on the Images For Detail

This manual can be downloaded from the Computing History Shop.

  • File Size: 2.53 MB
  • Price: £4

Help support the museum by buying from the museum shop

View all items

Founding Sponsors
redgate Google ARM Real VNC Microsoft Research
Heritage Lottery Funded
Heritage Lottery Fund
Accredited Museum