Data Security Through Cryptography
From the preface:
'The purpose of this manual is to describe cryptography and the role it plays in the data security of a system installation.
The subject matter is discussed at a high level; the details about some of the topics mentioned in this manual are found in the appropriate document listed under "Related Publications."
The reader is assumed to have an elementary knowledge of data processing concepts and techniques, the IBM System/360. IBM System/370, and teleprocessing.
Note: The concepts and techniques discussed in this manual are simply an exploration of some of the ways cryptography may be used in data security. The presentation of such concepts and techniques is not intended to imply that such concepts and techniques arc or will be implemented in IBM products.'
This document has recently been digitised and made available here. Digitising our collections requires significant resources. Please consider making a donation to the Centre if you download this document! The donate button is at the top of this page, by the search bar.
This exhibit has a reference ID of CH10749. Please quote this reference ID in any communication with the Centre for Computing History.