Abstract
The normal use of cryptography in unclassified computing systems often fails to provide the level of protection that the system designers and users would expect. This is partially caused by confusion of cryptographic keys and user passwords, and by un- derestimations of the power of known plaintext attacks. The situation is worsenned by performance constraints and occasionally by the system builder’s gross misunderstand- ings of the cryptographic algorithm and protocol.
Chapter PDF
References
Robert Baldwin Rule Based Analysis of Computer Security. LCS Technical Report 401, Massachusetts Institute of Technology, 1987.
Russell L. Brand A Computer Security Tutorial. 1987.
David C. Feldmeier and Philip R. Kara UNIX Password Security-Ten Years Later (In this Volume) 1989.
S. P. Miller, B. C. Neuman, J. I. Schiller, and J. H. Slatzer, Kerberos Authentication and Authorization System. Project Athena Technical Plan. Project Athena, Massachusetts Institute of Technology. 1987.
Andrew Odlyzko (In preperation).
J. G. Steiner, B. C. Neuman, and J. I. Schiller, Kerberos: An Authentication Service for Open Network Systems. IUSENIX Conference Proceedings, Winter 1988, pp. 191–202, USENIX Association, February 1988.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1990 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Brand, R.L. (1990). Problems with the Normal Use of Cryptography for Providing Security on Unclassified Networks. In: Brassard, G. (eds) Advances in Cryptology — CRYPTO’ 89 Proceedings. CRYPTO 1989. Lecture Notes in Computer Science, vol 435. Springer, New York, NY. https://doi.org/10.1007/0-387-34805-0_4
Download citation
DOI: https://doi.org/10.1007/0-387-34805-0_4
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-0-387-97317-3
Online ISBN: 978-0-387-34805-6
eBook Packages: Springer Book Archive