DocumentCode :
1232498
Title :
Information technology security using cryptography
Author :
Sanchez-Reillo, R. ; Lopez-Ongil, C. ; Entrena-Arrontes, L. ; Sanchez-Avila, C.
Author_Institution :
Dpt. Tecnologia Electronica, Univ. Carlos III de Madrid, Spain
Volume :
18
Issue :
6
fYear :
2003
fDate :
6/1/2003 12:00:00 AM
Firstpage :
21
Lastpage :
24
Abstract :
It is widely known that information technology applications should be secured. During the last years, special efforts have been applied to achieve a great level of security. These efforts have increased security in some aspects, such as cryptographic algorithms and authentication techniques, etc. But many other security holes have appeared in these applications, making the improvements achieved a "waste of time and money". In this paper, some of these security holes are exposed. Using security hardware modules can overcome some of these holes, if they are designed according to the applications specification.
Keywords :
authorisation; computer crime; computer viruses; cryptography; data privacy; message authentication; telecommunication security; IT systems security; authentication techniques; cryptographic algorithms; cryptography; hackers; information technology security; security hardware modules; Computer hacking; Credit cards; Data security; Hardware; Information security; Information technology; Internet; Optimized production technology; Power system security; Public key cryptography;
fLanguage :
English
Journal_Title :
Aerospace and Electronic Systems Magazine, IEEE
Publisher :
ieee
ISSN :
0885-8985
Type :
jour
DOI :
10.1109/MAES.2003.1209586
Filename :
1209586
Link To Document :
بازگشت