Security for the DoD Transmission Control Protocol
In securing packet switched digital communications, it is possible to add the security measures at almost any layer of the Open Systems Interconnection (OSI) model of network functioning. At one extreme, security may be supplied either by physical protection of the communication links (with no impact at all on network communication protocols) or by independent encryption of the traffic on each link of the network (with little protocol impact). Solutions or this sort are called link security and, although widely employed, have the disadvantage of requiring the users to place a high degree of trust in the network. At the other extreme, it is possible, using cryptography, to add security to each individual user level application. This has the advantage of minimizing the user’s need to trust the network and thus providing end-to-end security, but also has the disadvantage of requiring a multiplicity of implementations.
KeywordsSequence Number Transmission Control Protocol Cipher Block Transport Layer Security Layer
- Whitfield Diffie, “Conventional Versus Public Key Cryptosystems,” in Secure Communiations and Asymetric Cryptosystems, Edited by Gustavus J. Simmons, Westview Press, Boulder, Colorado, 1982.Google Scholar
- “DoD Standard, Internet Protocol,” Information Sciences Institute, University of Southern California, Marina del Rey, California, RFC 791, September 1981.Google Scholar
- “DoD Standard, Transmission Control Protocol,” Information Sciences Institute, University of Southern California, Marina del Rey, California, RFC 793, September 1981.Google Scholar
- Steven T. Kent, “Some Thoughts on TCP and Communication Security,” MIT, Laboratory for Computer Science, Local Network Note, No. 6, 4 May 1977.Google Scholar
- “Modes of Operation for the Data Encryption Standard,” National Bureau of Standards, Federal Information Processing Standards Publication 81, 1980.Google Scholar