Title :
Some cryptographic techniques for machine-to-machine data communications
Author :
Feistel, Horst ; Notz, William A. ; Smith, J. Lynn
Author_Institution :
IBM Thomas J. Watson Research Center, Yorktown Heights, N.Y.
Abstract :
Some of the threats to the integrity of multiuser teleprocessing systems and to the data they contain can be countered by the use of cryptography. Stream-generator ciphers are not ideally suited for such an application, thus the use of block ciphers, which have the beneficial property of a strong nonlinear intersymbol dependence, is suggested. This property provides the means for automatic error detection for verifying the authenticity of terminal operators, and for ensuring messase integrity. An experimental demonstration system has been constructed to illustrate protection features that can be provided for real applications.
Keywords :
Centralized control; Control systems; Cryptography; Data communication; Data processing; Data security; Data systems; Information security; Protection; Time varying systems;
Journal_Title :
Proceedings of the IEEE
DOI :
10.1109/PROC.1975.10005