DocumentCode
2829160
Title
The hardware environment
Author
Needham, R.M.
fYear
1999
fDate
1999
Firstpage
236
Abstract
The paper considers how security protocols are as they are in part because of the hardware environment in which they are expected to function. Expectations were set nearly twenty years ago, when communications were very unreliable and slow, when reliable sources of time were most unusual, when encryption was extremely slow, when memories and disks were small and slow. In consequence protocol designers went to great lengths to minimise the number of messages sent and their size, particularly the size of the encrypted part. It was considered very undesirable to rely on time other than very locally for ordinal purposes, and systems were expected as far as possible to be stateless
Keywords
computer architecture; protocols; security of data; communications; data security; disks; encryption; hardware environment; memories; security protocols; time; Cryptography; Hardware; Insulation; Operating systems; Personal communication networks; Programming profession; Protection; Protocols; Security; Time sharing computer systems;
fLanguage
English
Publisher
ieee
Conference_Titel
Security and Privacy, 1999. Proceedings of the 1999 IEEE Symposium on
Conference_Location
Oakland, CA
ISSN
1081-6011
Print_ISBN
0-7695-0176-1
Type
conf
DOI
10.1109/SECPRI.1999.766918
Filename
766918
Link To Document