Skip to main content

The three faces of information security

  • Section 11 Rump Session
  • Conference paper
  • First Online:
Advances in Cryptology — AUSCRYPT '90 (AUSCRYPT 1990)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 453))

Included in the following conference series:

Abstract

CONFIDENTIALITY, INTEGRITY, and AVAILABILITY are the three faces of information security. These goals can all be achieved by use of cryptography. This paper will discuss:

  1. 1.

    Initial authentication of user and host using:

  1. (a)

    asymmetric ciphers; or

  2. (b)

    symmetric ciphers.

  3. 2.

    Exchange of cryptographic keys for:

  1. (a)

    privacy transformation; and

  2. (b)

    message authentication.

  3. 3.

    Continuous re-authentication to:

  1. (a)

    test user and host presence; and

  2. (b)

    assure channel integrity.

  3. 4.

    Implementation in all comunication modes:

  1. (a)

    two-party (one-to-one);

  2. (b)

    broadcast (one-to-many); and

  3. (c)

    conference (many-to-many).

The existance of umpires, network security officers or certificating authorities (CA) is not presumed, nor is it ruled out.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agnew, G.B., Secrecy and Privacy in a Global Area Network Environment, Proc. Eurocrypt'84, pp. 349–363.

    Google Scholar 

  2. Anderson, D.P., et al., A Protocol for Secure Communication and its Performance, Proc. 7th Int. Conf. on Distributed Computing, 1988, pp. 473–480.

    Google Scholar 

  3. Blum, M. and S. Micali, How to Generate Cryptographically Secure Sequences of Pseudo Random Bits, Proc. 23rd Sym. on Foundations of Computer Science, 1982, p. 112–117.

    Google Scholar 

  4. Chaum, D. and T.H. Guenta, A Secure and Privacy Protecting Protocol for Transmitting Personal Information Between Organisations,Proc. Eurocrypt'85, pp. 118–167.

    Google Scholar 

  5. Davida, G.I., et al., Security and Privacy, Proc. Compsac`78,pp. 194–203.

    Google Scholar 

  6. Davies. D.W. and J.K. Hirst, Encipherment and Signature in Teletex, Proc. 6th ICCC, 1982.

    Google Scholar 

  7. Davio, M., J.M. Geothals and J.J. Quisquater, Authentication Procedures, Workshop on Cryptography, Bad Feurstein, DBR, May 29–April 2, 1982.

    Google Scholar 

  8. Even, S., et al., On the Security of Ping-Pong Protocols when Implemented using the RSA, Proc. Eurocrypt'84, pp. 58–92.

    Google Scholar 

  9. Ramesh, K., A Security Imbedded Authentication Protocol, Proc. IEEE Infocom'88, pp. 105–109.

    Google Scholar 

  10. Kent, S.T., et al., A Personal Authentication System for Access Control to the Defense Data Network, Proc. Eascon'82, pp. 89–93.

    Google Scholar 

  11. Letham, L., et al., Software Security is Provided by an EPROM that Performs an Authentication Handshake, 4th Int. Conf. on Computers and Communications, 1985, pp. 122–126.

    Google Scholar 

  12. Mason, A., A Pay-Per-View Conditional Access System for DBS by Means of Secure Over-Air Credit Transmissions, Proc. Int. Conf. on Secure Communications Systems, 1984, pp. 66–70.

    Google Scholar 

  13. Muftic, S., Secure Mechanisms for Computer Networks: Results of the CEC COST-11 Tex Project, Computer Networks and ISDN Systems, 15, 1988, pp. 67–72.

    Google Scholar 

  14. Perugia, O. et al., On Encryption and Authentication Procedures for Tele-Surveillance Systems, Ottawa, 1981.

    Google Scholar 

  15. Price, W., Encryption in Computer Networks and Message Systems, Int. Sym. on Computer Systems, Ottawa, 1981.

    Google Scholar 

  16. Purdy, G.B., G.J. Simmonds and James A. Studier, A Software Protection Scheme, Proc. Sym. on Security and Privacy, 1982, pp. 99–103.

    Google Scholar 

  17. Rivest, R.L., A. Shamir and L.M. Adleman, A Method for Obtaining Digital Signatures and Public Key Cryptosystems, AAAS Annual Meeting, 1980.

    Google Scholar 

  18. Shaumüller-Bichl, I. and E. Piller, A Method of Software Protection Based on the Use of Smart Cards and Cryptographic Technique, Proc. Eurocrypt'84, pp. 446–454.

    Google Scholar 

  19. Simmonds, G.J., Message Authentication Without Privacy, AAAS Annual Meeting, 1980.

    Google Scholar 

  20. Simmonds, G.J., The Practice of Authentication, Proc. Eurocrypt'86, pp. 81–84.

    Google Scholar 

  21. Vazinani, U. and V.V Vazinani, Efficient and Secure Pseudo-Random Number Generation, Proc. Crypto'84, pp. 193–201.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Jennifer Seberry Josef Pieprzyk

Rights and permissions

Reprints and permissions

Copyright information

© 1990 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Carroll, J.M. (1990). The three faces of information security. In: Seberry, J., Pieprzyk, J. (eds) Advances in Cryptology — AUSCRYPT '90. AUSCRYPT 1990. Lecture Notes in Computer Science, vol 453. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0030382

Download citation

  • DOI: https://doi.org/10.1007/BFb0030382

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-53000-8

  • Online ISBN: 978-3-540-46297-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics