Abstract
CONFIDENTIALITY, INTEGRITY, and AVAILABILITY are the three faces of information security. These goals can all be achieved by use of cryptography. This paper will discuss:
-
1.
Initial authentication of user and host using:
-
(a)
asymmetric ciphers; or
-
(b)
symmetric ciphers.
-
2.
Exchange of cryptographic keys for:
-
(a)
privacy transformation; and
-
(b)
message authentication.
-
3.
Continuous re-authentication to:
-
(a)
test user and host presence; and
-
(b)
assure channel integrity.
-
4.
Implementation in all comunication modes:
-
(a)
two-party (one-to-one);
-
(b)
broadcast (one-to-many); and
-
(c)
conference (many-to-many).
The existance of umpires, network security officers or certificating authorities (CA) is not presumed, nor is it ruled out.
Preview
Unable to display preview. Download preview PDF.
References
Agnew, G.B., Secrecy and Privacy in a Global Area Network Environment, Proc. Eurocrypt'84, pp. 349–363.
Anderson, D.P., et al., A Protocol for Secure Communication and its Performance, Proc. 7th Int. Conf. on Distributed Computing, 1988, pp. 473–480.
Blum, M. and S. Micali, How to Generate Cryptographically Secure Sequences of Pseudo Random Bits, Proc. 23rd Sym. on Foundations of Computer Science, 1982, p. 112–117.
Chaum, D. and T.H. Guenta, A Secure and Privacy Protecting Protocol for Transmitting Personal Information Between Organisations,Proc. Eurocrypt'85, pp. 118–167.
Davida, G.I., et al., Security and Privacy, Proc. Compsac`78,pp. 194–203.
Davies. D.W. and J.K. Hirst, Encipherment and Signature in Teletex, Proc. 6th ICCC, 1982.
Davio, M., J.M. Geothals and J.J. Quisquater, Authentication Procedures, Workshop on Cryptography, Bad Feurstein, DBR, May 29–April 2, 1982.
Even, S., et al., On the Security of Ping-Pong Protocols when Implemented using the RSA, Proc. Eurocrypt'84, pp. 58–92.
Ramesh, K., A Security Imbedded Authentication Protocol, Proc. IEEE Infocom'88, pp. 105–109.
Kent, S.T., et al., A Personal Authentication System for Access Control to the Defense Data Network, Proc. Eascon'82, pp. 89–93.
Letham, L., et al., Software Security is Provided by an EPROM that Performs an Authentication Handshake, 4th Int. Conf. on Computers and Communications, 1985, pp. 122–126.
Mason, A., A Pay-Per-View Conditional Access System for DBS by Means of Secure Over-Air Credit Transmissions, Proc. Int. Conf. on Secure Communications Systems, 1984, pp. 66–70.
Muftic, S., Secure Mechanisms for Computer Networks: Results of the CEC COST-11 Tex Project, Computer Networks and ISDN Systems, 15, 1988, pp. 67–72.
Perugia, O. et al., On Encryption and Authentication Procedures for Tele-Surveillance Systems, Ottawa, 1981.
Price, W., Encryption in Computer Networks and Message Systems, Int. Sym. on Computer Systems, Ottawa, 1981.
Purdy, G.B., G.J. Simmonds and James A. Studier, A Software Protection Scheme, Proc. Sym. on Security and Privacy, 1982, pp. 99–103.
Rivest, R.L., A. Shamir and L.M. Adleman, A Method for Obtaining Digital Signatures and Public Key Cryptosystems, AAAS Annual Meeting, 1980.
Shaumüller-Bichl, I. and E. Piller, A Method of Software Protection Based on the Use of Smart Cards and Cryptographic Technique, Proc. Eurocrypt'84, pp. 446–454.
Simmonds, G.J., Message Authentication Without Privacy, AAAS Annual Meeting, 1980.
Simmonds, G.J., The Practice of Authentication, Proc. Eurocrypt'86, pp. 81–84.
Vazinani, U. and V.V Vazinani, Efficient and Secure Pseudo-Random Number Generation, Proc. Crypto'84, pp. 193–201.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1990 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Carroll, J.M. (1990). The three faces of information security. In: Seberry, J., Pieprzyk, J. (eds) Advances in Cryptology — AUSCRYPT '90. AUSCRYPT 1990. Lecture Notes in Computer Science, vol 453. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0030382
Download citation
DOI: https://doi.org/10.1007/BFb0030382
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-53000-8
Online ISBN: 978-3-540-46297-2
eBook Packages: Springer Book Archive