Computer network with modified host-to-host encryption keys

作者: Butler Lampson , Martin Abadi , Michael Burrows

DOI:

关键词:

摘要: In a computer network, each pair of host computers that need to exchange data packets establish single host-to-host encryption/decryption key. Then, whenever one sends packet the other computer, it first forms predefined logical combination established key and destination buffer index which is being sent, then uses resulting value encrypt secure portions packet. The included in packet's header, not encrypted. When receiving receives encrypted packet, reads from same generate decryption key, computed decrypt received If has been modified either by noise or an interloper, will be different encryption used sending therefore decrypted using unintelligible. Thus, interlopers are prevented breaching confidentiality data.

参考文章(6)
A.J. Mazeikis, G.H. MacEwen, A communication protocol for a multi-level secure network Proceedings of TRICOMM `91: IEEE Conference on Communications Software: Communications for Distributed Applications and Systems. pp. 89- 103 ,(1991) , 10.1109/TRICOM.1991.152879
M.S. Iqbal, F.S.F. Poon, Packet level access control scheme for internetwork security IEE Proceedings I Communications, Speech and Vision. ,vol. 139, pp. 165- 175 ,(1992) , 10.1049/IP-I-2.1992.0025
S.G. Stubblebine, V.D. Gligor, On message integrity in cryptographic protocols ieee symposium on security and privacy. pp. 85- 104 ,(1992) , 10.1109/RISP.1992.213268
Butler W. Lampson, Morrie Gasser, Mark F. Kempf, Amar Gupta, William R. Hawe, Barry A. Spinney, Joseph J. Tardo, Ching S. Lee, Bentley J. Herbison, Charles W. Kaufman, Cryptography processor and method with optional status encoding ,(1991)