liu.seSearch for publications in DiVA
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Data Network Security: Part I Problem Survey and Model
Linköping University, Department of Electrical Engineering. Linköping University, The Institute of Technology.
Linköping University, Department of Electrical Engineering. Linköping University, The Institute of Technology.
Linköping University, Department of Electrical Engineering. Linköping University, The Institute of Technology.
1977 (English)Report (Other academic)
Abstract [en]

Data encryption and related methods may be used to preserve information security i n a data network. Here information security is defined as the degree to which the destruction, change or loss of information is presented. Information is defined as the content of the message represented by the data. The information in a block of data is unchanged if the intended result of the transmission of the block is obtained. This means for example that the original message reaches the correct destination where it is interpreted as intended. Undisturbed information does not, in general, require un disturbed data.

The network is supposed to be a public network, accessed by many different users. We are interested in a well defined group of users who are communicating mainly among themselves. Different groups, however, are also allowed to communicate in a well defined manner. The logical structure of the communication within a group is star-shaped. The information communicated within the groups hall be protected against threats from other users of the network, from illegitimate users (wiretappers etc) and from members in the group. The structure of the threats is described in section 3 of this paper.

The network itself and the requirement it imposes are supposed to be unchanged. Encryption and decryption are taking place outside the network. The encrypted data shall comply with the requirements of the network. The communication process in the group consists of time-limited messages which are essentially transmitted from one point to another in the network. This is the basis for the model of the communication which is described in section 4. The model, although simple, enables us to structure the problems in connection with encryption/decryption. This is done in section 5 and 6. The purpose of the paper is to form a basis for synthesis of security measures by means on cryptological methods. The analysis is general enough to be applied to any data network and any type of user group.

Place, publisher, year, edition, pages
Linköping: Linköping University Electronic Press, 1977. , 19 p.
Series
LiTH-ISY-I, ISSN 0281-6253 ; 176
National Category
Communication Systems Telecommunications Computer and Information Science Computer Science
Identifiers
URN: urn:nbn:se:liu:diva-131837ISRN: LiTH-ISY-I-0176OAI: oai:DiVA.org:liu-131837DiVA: diva2:1033944
Available from: 2016-10-10 Created: 2016-10-10 Last updated: 2016-10-11Bibliographically approved

Open Access in DiVA

Data Network Security: Part I Problem Survey and Model(2896 kB)35 downloads
File information
File name FULLTEXT01.pdfFile size 2896 kBChecksum SHA-512
2159ed0ec798bfcafad9cf162a9cbc1fce305b289e08e34e5d9f3a3b58eae10ff502801c7e1e5685287ae3bae41348ce0d94114e8dcc34e25ff0992b69946401
Type fulltextMimetype application/pdf

Search in DiVA

By author/editor
Blom, RolfFåk, ViivekeIngemarsson, Ingemar
By organisation
Department of Electrical EngineeringThe Institute of Technology
Communication SystemsTelecommunicationsComputer and Information ScienceComputer Science

Search outside of DiVA

GoogleGoogle Scholar
Total: 35 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 52 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf