1. On the Origin of Kerberos.
- Author
-
Saltzer, Jerome H. and Walden, David
- Subjects
- *
COMPUTER network protocols , *TELEPHONE systems , *COMPUTER engineering , *TELECOMMUNICATION systems , *COMPUTER security , *DATA security - Abstract
For a second generation secure telephone system, Howard Rosenblum in 1967 proposed and patented a key distribution system that he called Bellfield. 2 When in the 1960s the NSA developed a secure telephone system these requirements presented a problem: since anyone with a phone capable of encryptionmightplaceacalltoanyothersuchphone, it seemed that there had to be an advance arrangement to share a unique encryption key between every potential pair of telephones. Thus, cryptographic communication requires advance planning to choose encryption and decryption keys and to distribute those keys to the sender and receiver using a secure communication method. The remainder of this discussion assumes use of symmetric encryption, which means that the encryption and decryption keys are either identical or derivable one from the other, so the secure communication of the keys must assure bothconfidentialityandintegrity. [Extracted from the article]
- Published
- 2021
- Full Text
- View/download PDF