An analysis of two layers of encryption to protect network traffic
Ware, Ryan T.
MetadataShow full item record
In this thesis, we attempt to analyze the effectiveness of defense-in-depth mechanisms. As an example of defense-indepth, we study two layers of encryption to protect network traffic. At a quick glance, two layers of encryption appear to provide some strong security benefits including increased host- and network-level security, increased cryptographic strength, and a backup layer of encryption. However, intuition and quick glances should not be relied upon in the field of Information Assurance. The intent of this thesis is to quantitatively show the increase in security the extra layer of encryption provides and to compare this information with the cost of the extra security. This thesis proposes two architectures with one layer of encryption and and several architectures with two layers of encryption. It quickly compares these architectures and then starts a more in-depth analysis of the best two-layer architecture using Fault Tree Analysis. The thesis presents the results from the study, provides some recommendations based on the results, and discusses future work in this field
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Short Message Service (SMS) security solution for mobile devices Ng, Yu Loon. (Monterey, California. Naval Postgraduate School, 2006-12);This thesis focuses on the security of Short Message Service (SMS) and the Global System for Mobile communication (GSM) network and the use of encryption to protect SMS messages. A detailed study of the GSM network and ...
Lawful hacking: toward a middle-ground solution to the going dark problem Nguyen, Hoaithi Y.T. (Monterey, California: Naval Postgraduate School, 2017-03);This thesis examines the ongoing debate between law enforcement and the intelligence communities on one side, and the technology industry and privacy rights groups on the other, over the going dark problem. Going dark is ...
Symmetric link key management for secure neighbor discovery in a decentralized wireless sensor network Chew, Kelvin T. (Monterey, California: Naval Postgraduate School, 2017-09);Wireless sensor networks provide a low-signature communications system that can be used for a wide variety of military applications. These networks are vulnerable to intrusion, however, and must balance security with ...