• DocumentCode
    2829160
  • Title

    The hardware environment

  • Author

    Needham, R.M.

  • fYear
    1999
  • fDate
    1999
  • Firstpage
    236
  • Abstract
    The paper considers how security protocols are as they are in part because of the hardware environment in which they are expected to function. Expectations were set nearly twenty years ago, when communications were very unreliable and slow, when reliable sources of time were most unusual, when encryption was extremely slow, when memories and disks were small and slow. In consequence protocol designers went to great lengths to minimise the number of messages sent and their size, particularly the size of the encrypted part. It was considered very undesirable to rely on time other than very locally for ordinal purposes, and systems were expected as far as possible to be stateless
  • Keywords
    computer architecture; protocols; security of data; communications; data security; disks; encryption; hardware environment; memories; security protocols; time; Cryptography; Hardware; Insulation; Operating systems; Personal communication networks; Programming profession; Protection; Protocols; Security; Time sharing computer systems;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Security and Privacy, 1999. Proceedings of the 1999 IEEE Symposium on
  • Conference_Location
    Oakland, CA
  • ISSN
    1081-6011
  • Print_ISBN
    0-7695-0176-1
  • Type

    conf

  • DOI
    10.1109/SECPRI.1999.766918
  • Filename
    766918