Back to Search Start Over

An Encryption and Authentification Procedure for Telesurveillance Systems.

Authors :
Goos, G.
Hartmanis, J.
Barstow, D.
Brauer, W.
Brinch Hansen, P.
Gries, D.
Luckham, D.
Moler, C.
Pnueli, A.
Seegmüller, G.
Stoer, J.
Wirth, N.
Beth, Thomas
Cot, Norbert
Ingemarsson, Ingemar
Brugia, Odoaro
Improta, Salvatore
Woltowicz, William
Source :
Advances in Cryptology; 1985, p437-445, 9p
Publication Year :
1985

Abstract

To perform message authentication in a telesurveillance system, the paper proposes a non linear time varying encryption algorithm, based on key layering in three levels (system key, intermediate key, running key) and on encryption organization into two or more sets of three operations (running key rotation, message digit substitution and transposition). The algorithm was designed to be implemented on an 8-bit microprocessor. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISBNs :
9783540160762
Database :
Supplemental Index
Journal :
Advances in Cryptology
Publication Type :
Book
Accession number :
33037944
Full Text :
https://doi.org/10.1007/3-540-39757-4_31