Title
The hardware environment
Abstract
The paper considers how security protocols are as they are in part because of the hardware environment in which they are expected to function. Expectations were set nearly twenty years ago, when communications were very unreliable and slow, when reliable sources of time were most unusual, when encryption was extremely slow, when memories and disks were small and slow. In consequence protocol designers went to great lengths to minimise the number of messages sent and their size, particularly the size of the encrypted part. It was considered very undesirable to rely on time other than very locally for ordinal purposes, and systems were expected as far as possible to be stateless
Year
DOI
Venue
1999
10.1109/SECPRI.1999.766918
IEEE Symposium on Security and Privacy
Keywords
Field
DocType
computer architecture,protocols,security of data,communications,data security,disks,encryption,hardware environment,memories,security protocols,time
Data security,Computer security compromised by hardware failure,Security through obscurity,Cryptographic protocol,Computer science,Computer security,Encryption,Cloud computing security,Security information and event management,Computer hardware,Stateless protocol
Conference
ISSN
ISBN
Citations 
1081-6011
0-7695-0176-1
0
PageRank 
References 
Authors
0.34
0
1
Name
Order
Citations
PageRank
Roger M. Needham146482075.99