Abstract
To perform message authentication in a telesurveillance system, the paper proposes a non linear time varying encryption algorithm, based on key layering in three levels (system key, intermediate key, running key) and on encryption organization into two or more sets of three operations (running key rotation, message digit substitution and transposition). The algorithm was designed to be implemented on an 8-bit microprocessor.
Work carried out at the Fondazione Ugo Bordoni under the agreement between the Istituto Superiore P.T. and the Fondazione Ugo Bordoni.
Chapter PDF
References
P.R. Geffe: “How to protect data with ciphers that are really hard to break” Electronics, jan.4, 1973, p.99–101.
E.L. Key: “An analysis of the structure and complexity of non linear binary sequence generators” IEEE Trans. on Inf. Th., v.IT-22, n.6, nov.1976, p.732–6.
A. Gill: “Linear sequential circuits” Mc.Graw Hill, 1967.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1985 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Brugia, O., Improta, S., Woltowicz, W. (1985). An Encryption and Authentification Procedure for Telesurveillance Systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds) Advances in Cryptology. EUROCRYPT 1984. Lecture Notes in Computer Science, vol 209. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-39757-4_31
Download citation
DOI: https://doi.org/10.1007/3-540-39757-4_31
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-16076-2
Online ISBN: 978-3-540-39757-1
eBook Packages: Springer Book Archive