Analysis of the DES, LOKI, and IDEA algorithms for use in an encrypted voice PC network
McClenney, Walter O.
MetadataShow full item record
The protection of information is of vital importance to the successful operation of both the Federal Government and the Department of the Navy. Attention is usually given to the protection of classified information. The Computer Security Act mandates that not only classified, but sensitive information be protected in accordance with the Privacy Act. The increasing reliance on networks makes this a challenging problem to overcome. The focus of this thesis is to examine the capabilities, effectiveness, and limitations of the DES, LOKI, and IDEA cryptosystems for use in the PC environment. It analyzes the use of these cryptosystems for network voice encryption. Further, this thesis examines the function and security of these cryptosystems and on possibilities for implementation in a Naval Postgraduate School PC network. Experimental results on the speed and efficiency of two of the cryptosystems are presented to show their relative strengths and weaknesses. A recommendation is made as to the appropriate cryptosystems to be used in a network implementation. Further recommendations are given on the type of computer networking architecture and the type of network encryption to use. (KAR) P. 2.
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Nguyen, Phong (Monterey, California. Naval Postgraduate School, 1992-09);The concealment of information passed over a non-secure communication link lies in the complex field of cryptography. Furthermore, when absolutely no secure channel exists for the exchange of a secret key with which data ...
Feasibility study of network operations center collaboration to improve application layer performance Meyer, Kent A. (Monterey, California: Naval Postgraduate School, 2009-03);Network Centric Warfare seeks to improve the link between the shooter and sensor networks, enabling direct access to pertinent information and a shorter decision loop with improved operational capabilities. The sensor-shooter ...
Blanco, Hilda (2008-06);Prioritizing is a fundamental task in capital facilities planning and finance. The protection of critical infrastructure systems, essential systems that underpin our society’s “national defense, economic prosperity and ...