Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
On the key storage requirements for secure terminals
Jansen C. Computers and Security5 (2):145-149,1986.Type:Article
Date Reviewed: Mar 1 1987

The author of this paper is employed by Philips Usfa in the development of cryptographic equipment. As a consequence, he is appropriately equipped to present some deliberations on practical encryption applications.

In this paper, he addresses the question of key management in a large network which employs “classical” (symmetric, secret key) end-to-end encryption procedures. In particular, it is assumed that a unique key is available for each pair of terminals which may intercommunicate. The specific requirements for key storage at each terminal are then considered.

In what is perhaps the most obvious arrangement for an N-terminal network, each terminal must accommodate N − 1 distinct keys (i.e., one for each other terminal in the network). An alternative scheme is presented, where the network is subdivided in such a fashion that the storage requirement grows in a logarithmic manner as the network size is increased.

Those involved in the practical application of encryption schemes will find this paper both interesting and easy to read.

Reviewer:  G. K. Jenkins Review #: CR123333
Bookmark and Share
  Featured Reviewer  
 
Security and Protection (C.2.0 ... )
 
 
Data Encryption Standard (DES) (E.3 ... )
 
 
Public Key Cryptosystems (E.3 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Introduction to data security and controls (2nd ed.)
Edward R. I., QED Information Sciences, Inc., Wellesley, MA, 1991. Type: Book (9780894353864)
Aug 1 1992
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer
Davies D., Price W., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471900634)
Oct 1 1985
The development and proof of a formal specification for a multilevel secure system
Glasgow J., Macewen G. ACM Transactions on Computer Systems 5(2): 151-184, 1987. Type: Article
Oct 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy