.NET Security and Cryptography
Security and cryptography have always been recognized as important issues in multiuser and enterprise-level computing. Even in the early mainframe systems of the mid-1960s, such as System/360, [12] multiuser operating systems were designed with careful attention given to user authentication, program isolation, auditing, and privacy. Symmetric cryptographic algorithms, such as the Data Encryption Standard (DES), were used heavily in mainframe applications by banks and governments by the late 1970s. UNIX [13] systems continued to treat security as a first-class design requirement throughout its history. In the early 1990s, UNIX systems made use of symmetric and asymmetric cryptography in various technologies and protocols, such as Kerberos network authentication. [12] System/360 was developed by IBM in 1964. The chief architect working on this operating system was Gene Amdahl. [13] Unix was initially developed by Bell Labs (then part of ATT) in 1969 and the early 1970s. Ken Thompson wrote the first UNIX system in assembly language, and many other contributors, too numerous to mention, developed it further over the last 30 years . Many vendors contributed to its development, resulting in many competing implementations , including BSD, System V, Solaris, HP-UX, AIX, Linux, and FreeBSD. In contrast, the history of Windows has shown a marked lack of awareness toward issues related to security and cryptography. This is to some degree understandable, considering that for much of its early history, Windows ( especially in its 16-bit form) was used primarily as a single-user, non-mission-critical productivity tool and entertainment console. This is not to disparage Windows in any way. Indeed, Windows quickly grew to become a significant industry in its own right, providing the world with effective and affordable computing capabilities. However, the concepts of security, privacy, and authentication were largely unknown to most Windows users, and the vendor simply catered to that market. In contrast to the obsession with security, privacy, and reliability typical of large corporate computing facilities, Windows users have been generally tolerant of security weaknesses and more interested in powerful user-oriented features. This is why, much to the chagrin of mainframe old-timers, Windows has been plagued with malicious code, operating system reliability problems, and information leakage. Fortunately, this is all changing now, for many reasons.
|