Abstract
In securing packet switched digital communications, it is possible to add the security measures at almost any layer of the Open Systems Interconnection (OSI) model of network functioning. At one extreme, security may be supplied either by physical protection of the communication links (with no impact at all on network communication protocols) or by independent encryption of the traffic on each link of the network (with little protocol impact). Solutions or this sort are called link security and, although widely employed, have the disadvantage of requiring the users to place a high degree of trust in the network. At the other extreme, it is possible, using cryptography, to add security to each individual user level application. This has the advantage of minimizing the user’s need to trust the network and thus providing end-to-end security, but also has the disadvantage of requiring a multiplicity of implementations.
Chapter PDF
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
D. L. Chaum, “Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms,” Communications of the ACM, Vol. 24, No. 2, pp. 84–88, February 1981.
Whitfield Diffie, “Conventional Versus Public Key Cryptosystems,” in Secure Communiations and Asymetric Cryptosystems, Edited by Gustavus J. Simmons, Westview Press, Boulder, Colorado, 1982.
“DoD Standard, Internet Protocol,” Information Sciences Institute, University of Southern California, Marina del Rey, California, RFC 791, September 1981.
“DoD Standard, Transmission Control Protocol,” Information Sciences Institute, University of Southern California, Marina del Rey, California, RFC 793, September 1981.
Steven T. Kent, “Some Thoughts on TCP and Communication Security,” MIT, Laboratory for Computer Science, Local Network Note, No. 6, 4 May 1977.
“Modes of Operation for the Data Encryption Standard,” National Bureau of Standards, Federal Information Processing Standards Publication 81, 1980.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1986 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Diffie, W. (1986). Security for the DoD Transmission Control Protocol. In: Williams, H.C. (eds) Advances in Cryptology — CRYPTO ’85 Proceedings. CRYPTO 1985. Lecture Notes in Computer Science, vol 218. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-39799-X_11
Download citation
DOI: https://doi.org/10.1007/3-540-39799-X_11
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-16463-0
Online ISBN: 978-3-540-39799-1
eBook Packages: Springer Book Archive