Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP
Path: utzoo!mnetor!seismo!lll-lcc!ptsfa!well!rab
From: rab@well.UUCP (Bob Bickford)
Newsgroups: sci.crypt
Subject: Re: encryption with public keys
Message-ID: <2248@well.UUCP>
Date: Tue, 23-Dec-86 07:04:49 EST
Article-I.D.: well.2248
Posted: Tue Dec 23 07:04:49 1986
Date-Received: Tue, 23-Dec-86 21:42:21 EST
References: <3072@ihuxf.UUCP>
Organization: Whole Earth Lectronic Link, Sausalito, CA
Lines: 14
Summary: ACM article


  
  There was an excellent article on this general subject in the
October 1985 issue of _Communications of the ACM_ in which the
author presents scenarios showing how to use a given encryption
system to build an information-secure society (in other words,
keeping your privacy!).  I recommend it.

-- 
Robert Bickford     {lll-crg,hplabs}!well!rab
terrorist, cryptography, DES, drugs, cipher, secret, decode, NSA, CIA, NRO.
 The above is food for the NSA line eater.  Add it to your .signature and
 you too can help overflow the NSA's ability to scan all traffic going in or
 out of the USA looking for "significant" words.  (This is not a joke, sadly.)