DocumentCode :
2829160
Title :
The hardware environment
Author :
Needham, R.M.
fYear :
1999
fDate :
1999
Firstpage :
236
Abstract :
The paper considers how security protocols are as they are in part because of the hardware environment in which they are expected to function. Expectations were set nearly twenty years ago, when communications were very unreliable and slow, when reliable sources of time were most unusual, when encryption was extremely slow, when memories and disks were small and slow. In consequence protocol designers went to great lengths to minimise the number of messages sent and their size, particularly the size of the encrypted part. It was considered very undesirable to rely on time other than very locally for ordinal purposes, and systems were expected as far as possible to be stateless
Keywords :
computer architecture; protocols; security of data; communications; data security; disks; encryption; hardware environment; memories; security protocols; time; Cryptography; Hardware; Insulation; Operating systems; Personal communication networks; Programming profession; Protection; Protocols; Security; Time sharing computer systems;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security and Privacy, 1999. Proceedings of the 1999 IEEE Symposium on
Conference_Location :
Oakland, CA
ISSN :
1081-6011
Print_ISBN :
0-7695-0176-1
Type :
conf
DOI :
10.1109/SECPRI.1999.766918
Filename :
766918
Link To Document :
بازگشت