TITLE

Interception Controls of Data Communications Systems

AUTHOR(S)
Chao, Joseph C.
PUB. DATE
March 1990
SOURCE
Journal of Information Systems;Spring90, Vol. 4 Issue 2, p69
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Data communications systems normally use combinations of transmission links for sending messages. Tapping risks of transmission links are discussed. Although fiber optics provides the highest level of interception protection among all links, tapping methods and countermeasures are available. Effective encryption systems should be used for securing highly sensitive messages traveling over links. Link, end-to-end, and public key encryptions may be used. Algorithm strength and key management of encryptions are both critical.
ACCESSION #
8746964

 

Related Articles

  • EFFICIENT CONDITIONAL PROXY RE-ENCRYPTION WITH CHOSEN CIPHER TEXT SECURITY. Vivek, S. Sree; Selvi, S. Sharmila Deva; Radhakishan, V.; Rangan, C. Pandu // International Journal of Network Security & Its Applications;Mar2012, Vol. 4 Issue 2, p179 

    In a proxy re-encryption (PRE) scheme, Alice gives a special information to a proxy that allows it to transform messages encrypted under Alice's public key into a encryption under Bob's public key such that the message is not revealed to the proxy. In [14], Jian Weng and others introduced the...

  • Death of public key? Fisher, Dennis // eWeek;9/20/2004, Vol. 21 Issue 38, p30 

    The article focuses the death of the public-key cryptography, the foundation upon which the e-commerce system is built. When word began circulating recently that a French mathematician working at Purdue University in West Lafayette, Indiana, claimed to have produced a proof of the famous Riemann...

  • ContSteg: Contourlet-Based Steganography Method. Sajedi, Hedieh; Jamzad, Mansour // Wireless Sensor Network;Oct2009, Vol. 1 Issue 3, p163 

    A category of techniques for secret data communication called steganography hides data in multimedia mediums. It involves embedding secret data into a cover-medium by means of small perceptible and statistical degradation. In this paper, a new adaptive steganography method based on contourlet...

  • A NOVEL DATA ENCRYPTION TECHNIQUE BY GENETIC CROSSOVER OF ROBUST BIOMETRIC KEY AND SESSION BASED PASSWORD. Bhattacharya, Tanmay; Hore, Sirshendu; Mukherjee, Ayan; Bhadra Chaudhuri, S. R. // International Journal of Network Security & Its Applications;Mar2011, Vol. 3 Issue 2, p111 

    In Fingerprint based Biometric authentication image of the fingerprint can be scanned and can be used later on for the purpose of authentication. So this process does not provide very high security. This paper proposes another level of security by using the concept of combined key. The key is...

  • An Identity-Based (IDB) Broadcast Encryption Scheme with Personalized Messages (BEPM). Xu, Ke; Liao, Yongjian; Qiao, Li; Liu, Zhangyun; Yang, Xiaowei // PLoS ONE;12/2/2015, Vol. 10 Issue 12, p1 

    A broadcast encryption scheme with personalized messages (BEPM) is a scheme in which a broadcaster transmits not only encrypted broadcast messages to a subset of recipients but also encrypted personalized messages to each user individually. Several broadcast encryption (BE) schemes allow a...

  • Diffie-Hellman Key Exchange.  // Network Dictionary;2007, p147 

    A definition of the term "Diffie-Hellman Key Exchange" is presented. It refers to a public key cryptography protocol based on the Diffie-Hellman algorithm that allows two parties to establish a shared secret over insecure communications channels. It is utilized within Internet Key Exchange to...

  • New Constructions of Identity-based Broadcast Encryption without Random Oracles. Leyou Zhang; Qing Wu; Yupu Hu // KSII Transactions on Internet & Information Systems;Feb2011, Vol. 5 Issue 2, p428 

    The main challenge in building efficient broadcast systems is to encrypt messages with short ciphertexts. In this paper, we present a new construction based on the identity. Our construction contains the desirable features, such as constant size ciphertexts and private keys, short public keys...

  • Reactively secure signature schemes. Backes, Michael; Pfitzmann, Birgit; Waidner, Michael // International Journal of Information Security;2005, Vol. 4 Issue 4, p242 

    Protocols for problems like Byzantine agreement, clock synchronization, or contract signing often use digital signatures as the only cryptographic operation. Proofs of such protocols are frequently based on an idealizing “black-box” model of signatures. We show that the standard...

  • New technology could simplify encryption management.  // Secured Lender;Nov/Dec2006, Vol. 62 Issue 6, p146 

    The article provides information on identity-based encryption (IBE) system designed to solve the shortcomings of public key infrastructure (PKI) encryption. A typical PKI requires users to register with a certificate authority to receive a pair of keys that encrypt and decrypt messages. IBE...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics