作者: Butler Lampson , Martin Abadi , Michael Burrows
DOI:
关键词:
摘要: In a computer network, each pair of host computers that need to exchange data packets establish single host-to-host encryption/decryption key. Then, whenever one sends packet the other computer, it first forms predefined logical combination established key and destination buffer index which is being sent, then uses resulting value encrypt secure portions packet. The included in packet's header, not encrypted. When receiving receives encrypted packet, reads from same generate decryption key, computed decrypt received If has been modified either by noise or an interloper, will be different encryption used sending therefore decrypted using unintelligible. Thus, interlopers are prevented breaching confidentiality data.