Published: October 7, 1975
Author(s)
Dennis Branstad (NBS)
Conference
Name: 4th Data Communications Symposium
Dates: 10/07/1975 - 10/09/1975
Location: Quebec City, Quebec, Canada
Citation: Network structures in an evolving operational environment : 4th Data Communications Symposium, pp. 8-1 - 8-7
Encryption can be an effective process for protecting data during transmission within distributed computer systems and networks. The degree of protection provided by encryption depends on the encryption algorithm employed, the implementation of the algorithm and the administrative procedures regulating the use of the algorithm. Additional security requirements of user identification, access authorization and security auditing may be satisfied by combining encryption technology with a network access control machine in a network security center. This paper presents an encryption algorithm for use in computer data communications and the security requirements that are satisfied by proper use of the algorithm. It also discusses the use of a network access control machine to enforce access restrictions for the network.
Encryption can be an effective process for protecting data during transmission within distributed computer systems and networks. The degree of protection provided by encryption depends on the encryption algorithm employed, the implementation of the algorithm and the administrative procedures...
See full abstract
Encryption can be an effective process for protecting data during transmission within distributed computer systems and networks. The degree of protection provided by encryption depends on the encryption algorithm employed, the implementation of the algorithm and the administrative procedures regulating the use of the algorithm. Additional security requirements of user identification, access authorization and security auditing may be satisfied by combining encryption technology with a network access control machine in a network security center. This paper presents an encryption algorithm for use in computer data communications and the security requirements that are satisfied by proper use of the algorithm. It also discusses the use of a network access control machine to enforce access restrictions for the network.
Hide full abstract
Keywords
access control; computer security; data communications; encryption
Control Families
None selected