Title :
Information technology security using cryptography
Author :
Sanchez-Reillo, R. ; Lopez-Ongil, C. ; Entrena-Arrontes, L. ; Sanchez-Avila, C.
Author_Institution :
Dpt. Tecnologia Electronica, Univ. Carlos III de Madrid, Spain
fDate :
6/1/2003 12:00:00 AM
Abstract :
It is widely known that information technology applications should be secured. During the last years, special efforts have been applied to achieve a great level of security. These efforts have increased security in some aspects, such as cryptographic algorithms and authentication techniques, etc. But many other security holes have appeared in these applications, making the improvements achieved a "waste of time and money". In this paper, some of these security holes are exposed. Using security hardware modules can overcome some of these holes, if they are designed according to the applications specification.
Keywords :
authorisation; computer crime; computer viruses; cryptography; data privacy; message authentication; telecommunication security; IT systems security; authentication techniques; cryptographic algorithms; cryptography; hackers; information technology security; security hardware modules; Computer hacking; Credit cards; Data security; Hardware; Information security; Information technology; Internet; Optimized production technology; Power system security; Public key cryptography;
Journal_Title :
Aerospace and Electronic Systems Magazine, IEEE
DOI :
10.1109/MAES.2003.1209586