Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/800103.803345acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
Article
Free access

Encryption-based protection for interactive user/computer communication

Published: 27 September 1977 Publication History

Abstract

This paper develops a virtual connection model, complete with intruder, for interactive terminal-host communication and presents a set of protection goals that characterize the security that can be provided for a physically unsecured connection. Fundamental requirements for protocols that achieve these goals and the role of encryption in the design of such protocols are examined. Functional and security constraints on positioning of protection protocols in a communication system and the impact of positioning on the design of secure operating systems are discussed.

References

[1]
Branstad, D., Security aspects of computer networks. Proceedings AIAA Computer Network Systems Conference, April 1973, paper 73-427.
[2]
Campbell, C., Design and specification of cryptographic capabilities. to appear in Proceedings Conference on Computer Security and the Data Encryption Standard, February 1977.
[3]
Connolly, R., Encryption standard protects data. Electronics 50, 5 (March 1977), pp. 74-75.
[4]
Cerf, V. and Kahn, R., A protocol for packet network intercommunication. IEEE Transactions on Communication 22, 5 (May 1974), pp. 637-648.
[5]
Diffie, W. and Hellman, M., A critique of the proposed Data Encryption Standard, CACM 19, 3 (March 1976), pp. 164-165.
[6]
Diffie, W. and Hellman, M., Multiuser cryptographic techniques. in 1976 NCC, AFIPS Conference Proceedings 45, (June 1976), pp. 109-112.
[7]
Farber, D. and Larson, K., Network security via dynamic process renaming. Proceedings Fourth Data Communications Symposium, October 1975 pp. 8.13-8.18.
[8]
Feinler, E. and Postel, J., Advanced Research Projects Agency, ARPA Current Network Protocols. NIC 7104, Network Information Center, SRI, Menlo Park, CA., April 1976.
[9]
Feistel, H., Cryptographic coding for data bank privacy. IBM Corporation Research Report RC 2827, March 1970.
[10]
Hellman, M., et al., Results of an initial attempt to cryptanalyze the NBS Data Encryption Standard. Stanford Center for Systems Research Information Systems Laboratoy SEL 76-042, September 1976.
[11]
IBM, Synchronous Data Link Control General Information. IBM Corporation System Reference Library, GA27-3093-0, March 1974.
[12]
International Standards Organization, TC97/SC6, Document 1005.
[13]
Kahn, D., The Codebreakers. Macmillan, 1967.
[14]
Karger, P., Non-discretionary access control for decentralized computing systems. SM Thesis, M.I.T. Dept. of Electrical Engineering and Computer Science, June 1977.
[15]
Kent, S., Encryption-based protection protocols for interactive user-computer communication. SM Thesis, M.I.T. Dept. of Electrical Engineering and Computer Science, May 1976. (Also available as M.I.T. Laboratory for Computer Science Technical Report TR-162.)
[16]
Metcalfe, R. and Boggs, D., Ethernet: distributed packet switching for local computer networks. CACM 19, 7 (July 1976), pp. 395-404.
[17]
National Bureau of Standards, Data Encryption Standard. Federal Information Processing Standards Publication 46, January 1977.
[18]
Saltzer, J., M.I.T. Laboratory for Computer Science, An Introduction to Multics. Technical Report TR-123, February 1974.
[19]
Saltzer, J. and Schroeder, M., The protection of information in computer systems. Proceedings IEEE 63, 9 (September 1975), pp.s 1287-1308.
[20]
Schmid, P., Review of ciphering methods to achieve communication security in data transmission networks. Proceedings International Zurich Seminar of Digital Communications, March 1976.
[21]
Shannon, C., Communication theory of secrecy systems. Bell System Technical Journal 28, 4 (October 1949), pp. 656-715.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGCOMM '77: Proceedings of the fifth symposium on Data communications
September 1977
180 pages
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 27 September 1977

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Acceptance Rates

Overall Acceptance Rate 462 of 3,389 submissions, 14%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)56
  • Downloads (Last 6 weeks)8
Reflects downloads up to 03 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2020)Attacks and Defenses in Short-Range Wireless Technologies for IoTIEEE Access10.1109/ACCESS.2020.29935538(88892-88932)Online publication date: 2020
  • (2012)Historical Background and Further ReadingOperational Semantics and Verification of Security Protocols10.1007/978-3-540-78636-8_8(143-155)Online publication date: 2012
  • (2006)Injective synchronisation: An extension of the authentication hierarchyTheoretical Computer Science10.1016/j.tcs.2006.08.034367:1-2(139-161)Online publication date: Nov-2006
  • (2005)Research problems of decentralized systems with largely autonomous nodesOperating Systems10.1007/3-540-08755-9_13(583-593)Online publication date: 25-May-2005
  • (2005)Design issues for secure computer networksOperating Systems10.1007/3-540-08755-9_11(517-546)Online publication date: 25-May-2005
  • (2002)Using signal processing to analyze wireless data trafficProceedings of the 1st ACM workshop on Wireless security10.1145/570681.570689(67-76)Online publication date: 28-Sep-2002
  • (1983)A Systematic Methodology for Analyzing Security Threats to Interprocess Communication in a Distributed SystemIEEE Transactions on Communications10.1109/TCOM.1983.109593531:9(1055-1063)Online publication date: 1983
  • (1979)Adding capability access to conventional file serversACM SIGOPS Operating Systems Review10.1145/850652.85065313:1(3-4)Online publication date: 1-Jan-1979
  • (1979)Protocol Design Considerations for Network SecurityInterlinking of Computer Networks10.1007/978-94-009-9431-7_14(239-259)Online publication date: 1979
  • (1979)Cryptography and Crypto-SystemsInterlinking of Computer Networks10.1007/978-94-009-9431-7_13(201-237)Online publication date: 1979
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media