Show simple item record

dc.contributor.authorNg, Wai-Hung
dc.date.accessioned2016-06-24T20:47:01Z
dc.date.available2016-06-24T20:47:01Z
dc.date.issued1989-11
dc.identifier.issn0884-5123
dc.identifier.issn0074-9079
dc.identifier.urihttp://hdl.handle.net/10150/614624
dc.descriptionInternational Telemetering Conference Proceedings / October 30-November 02, 1989 / Town & Country Hotel & Convention Center, San Diego, Californiaen_US
dc.description.abstractTwo new approaches, a time-variant key and a random transmission rate, are introduced to strengthen the security of encrypted digital communications in which a "black-box" type of crypto-device is employed. These approaches not only further upgrade present crypto-methodology, but may also secure the system against the possibility of the cryptographic key's falling into the hands of an unauthorized listener after initial communication has begun. Therefore, communication privacy could be maintained even under the most scrutinizing post-recorded ciphertext attack.
dc.description.sponsorshipInternational Foundation for Telemeteringen
dc.language.isoen_USen
dc.publisherInternational Foundation for Telemeteringen
dc.relation.urlhttp://www.telemetry.org/en
dc.rightsCopyright © International Foundation for Telemeteringen
dc.rights.urihttp://rightsstatements.org/vocab/InC/1.0/
dc.titleA Time-Variant Approach for Encrypted Digital Communicationsen_US
dc.typetexten
dc.typeProceedingsen
dc.contributor.departmentThe Aerospace Corporationen
dc.identifier.journalInternational Telemetering Conference Proceedingsen
dc.description.collectioninformationProceedings from the International Telemetering Conference are made available by the International Foundation for Telemetering and the University of Arizona Libraries. Visit http://www.telemetry.org/index.php/contact-us if you have questions about items in this collection.en
refterms.dateFOA2018-06-14T11:18:50Z
html.description.abstractTwo new approaches, a time-variant key and a random transmission rate, are introduced to strengthen the security of encrypted digital communications in which a "black-box" type of crypto-device is employed. These approaches not only further upgrade present crypto-methodology, but may also secure the system against the possibility of the cryptographic key's falling into the hands of an unauthorized listener after initial communication has begun. Therefore, communication privacy could be maintained even under the most scrutinizing post-recorded ciphertext attack.


Files in this item

Thumbnail
Name:
ITC_1989_89-0833.pdf
Size:
112.0Kb
Format:
PDF

This item appears in the following Collection(s)

Show simple item record