Analysis of the DES, LOKI, and IDEA algorithms for use in an encrypted voice PC network

Download
Author
McClenney, Walter O.
Date
1995-09Advisor
Lee, Chin-Hwa
Suh, M.
Metadata
Show full item recordAbstract
The protection of information is of vital importance to the successful operation of both the Federal Government and the Department of the Navy. Attention is usually given to the protection of classified information. The Computer Security Act mandates that not only classified, but sensitive information be protected in accordance with the Privacy Act. The increasing reliance on networks makes this a challenging problem to overcome. The focus of this thesis is to examine the capabilities, effectiveness, and limitations of the DES, LOKI, and IDEA cryptosystems for use in the PC environment. It analyzes the use of these cryptosystems for network voice encryption. Further, this thesis examines the function and security of these cryptosystems and on possibilities for implementation in a Naval Postgraduate School PC network. Experimental results on the speed and efficiency of two of the cryptosystems are presented to show their relative strengths and weaknesses. A recommendation is made as to the appropriate cryptosystems to be used in a network implementation. Further recommendations are given on the type of computer networking architecture and the type of network encryption to use. (KAR) P. 2.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Collections
Related items
Showing items related by title, author, creator and subject.
-
Public-key cryptography: a hardware implementation and novel neural network-based approach
Nguyen, Phong (Monterey, California. Naval Postgraduate School, 1992-09);The concealment of information passed over a non-secure communication link lies in the complex field of cryptography. Furthermore, when absolutely no secure channel exists for the exchange of a secret key with which data ... -
Feasibility study of network operations center collaboration to improve application layer performance
Meyer, Kent A. (Monterey, California: Naval Postgraduate School, 2009-03);Network Centric Warfare seeks to improve the link between the shooter and sensor networks, enabling direct access to pertinent information and a shorter decision loop with improved operational capabilities. The sensor-shooter ... -
Prioritizing assets in critical infrastructure systems
Blanco, Hilda (2008-06);Prioritizing is a fundamental task in capital facilities planning and finance. The protection of critical infrastructure systems, essential systems that underpin our society’s “national defense, economic prosperity and ...