Some cryptographic techniques for machine-to-machine data communications
- 1 January 1975
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in Proceedings of the IEEE
- Vol. 63 (11), 1545-1554
- https://doi.org/10.1109/proc.1975.10005
Abstract
Some of the threats to the integrity of multiuser teleprocessing systems and to the data they contain can be countered by the use of cryptography. Stream-generator ciphers are not ideally suited for such an application, thus the use of block ciphers, which have the beneficial property of a strong nonlinear intersymbol dependence, is suggested. This property provides the means for automatic error detection for verifying the authenticity of terminal operators, and for ensuring messase integrity. An experimental demonstration system has been constructed to illustrate protection features that can be provided for real applications.Keywords
This publication has 7 references indexed in Scilit:
- Cryptography and Computer PrivacyScientific American, 1973
- A virtual machine time-sharing systemIBM Systems Journal, 1970
- The authorization problem in shared filesIBM Systems Journal, 1970
- A consideration of the application of cryptographic techniques to data processingPublished by Association for Computing Machinery (ACM) ,1969
- System implications of information privacyPublished by Association for Computing Machinery (ACM) ,1967
- Security considerations in a multi-programmed computer systemPublished by Association for Computing Machinery (ACM) ,1967
- Communication Theory of Secrecy Systems*Bell System Technical Journal, 1949