An analysis of two layers of encryption to protect network traffic

Download
Author
Ware, Ryan T.
Date
2010-06Advisor
Dinolt, George
Second Reader
Guild, Jennifer
Metadata
Show full item recordAbstract
In this thesis, we attempt to analyze the effectiveness of defense-in-depth mechanisms. As an example of defense-indepth, we study two layers of encryption to protect network traffic. At a quick glance, two layers of encryption appear to provide some strong security benefits including increased host- and network-level security, increased cryptographic strength, and a backup layer of encryption. However, intuition and quick glances should not be relied upon in the field of Information Assurance. The intent of this thesis is to quantitatively show the increase in security the extra layer of encryption provides and to compare this information with the cost of the extra security. This thesis proposes two architectures with one layer of encryption and and several architectures with two layers of encryption. It quickly compares these architectures and then starts a more in-depth analysis of the best two-layer architecture using Fault Tree Analysis. The thesis presents the results from the study, provides some recommendations based on the results, and discusses future work in this field
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Collections
Related items
Showing items related by title, author, creator and subject.
-
Short Message Service (SMS) security solution for mobile devices
Ng, Yu Loon. (Monterey, California. Naval Postgraduate School, 2006-12);This thesis focuses on the security of Short Message Service (SMS) and the Global System for Mobile communication (GSM) network and the use of encryption to protect SMS messages. A detailed study of the GSM network and ... -
Lawful hacking: toward a middle-ground solution to the going dark problem
Nguyen, Hoaithi Y.T. (Monterey, California: Naval Postgraduate School, 2017-03);This thesis examines the ongoing debate between law enforcement and the intelligence communities on one side, and the technology industry and privacy rights groups on the other, over the going dark problem. Going dark is ... -
Symmetric link key management for secure neighbor discovery in a decentralized wireless sensor network
Chew, Kelvin T. (Monterey, California: Naval Postgraduate School, 2017-09);Wireless sensor networks provide a low-signature communications system that can be used for a wide variety of military applications. These networks are vulnerable to intrusion, however, and must balance security with ...