This thesis develops a complete set of protocols, which utilize a block cipher, e.g., the NBS data encryption standard, for protection interactive user-computer communication over physically unsecured channels. The use of the block cipher protects against disclosure of message contents to an intruder, and the protocols provide for the detection of message stream modification and denial of message service by an intruder. The protocols include facilities for key distribution, two-way login authentication, resynchronization following channel disruption, and expedition of high priority messages. The thesis presents designs for modules to implement the protocols, both in the terminal and in a host computer system, and discusses the results of a test implementation of the modules on Multics.
Cited By
- Swinehart D, McDaniel G and Boggs D WFS a simple shared file system for a distributed environment Proceedings of the seventh ACM symposium on Operating systems principles, (9-17)
- Needham R and Schroeder M (1978). Using encryption for authentication in large networks of computers, Communications of the ACM, 21:12, (993-999), Online publication date: 1-Dec-1978.
- Saltzer J (1978). Research problems of decentralized systems with largely autonomous nodes, ACM SIGOPS Operating Systems Review, 12:1, (43-52), Online publication date: 1-Jan-1978.
- Kent S Encryption-based protection for interactive user/computer communication Proceedings of the fifth symposium on Data communications, (5.7-5.13)
Recommendations
Trustworthiness-Based Group Communication Protocols
NBIS '14: Proceedings of the 2014 17th International Conference on Network-Based Information SystemsIn distributed applications, a group of multiple process are cooperating with each other by exchanging messages in underlying networks. A message sent by each process has to be delivered to every process in a group. In this paper, we discuss a protocol ...
Fully Deniable Interactive Encryption
Advances in Cryptology – CRYPTO 2020AbstractDeniable encryption (Canetti et al., Crypto 1996) enhances secret communication over public channels, providing the additional guarantee that the secrecy of communication is protected even if the parties are later coerced (or willingly bribed) to ...
Authenticated Secure Group Communication using Broadcast Encryption Key Computation
ITNG '08: Proceedings of the Fifth International Conference on Information Technology: New GenerationsBroadcast Encryption deals with broadcasting an encrypted message, so that only a set of users termed privileged can decrypt it. This is made possible with the computation of secret key which is known only to members of the privileged set. This ...