Unformatted text preview: rger than the plaintext. — The speed of I/O devices demands fast encryption and decryption, and will probably require encryption hardware. In some applications, special high-speed algorithms may be required. — Safe, long-term storage for keys is required. — Key management is much more complicated, since different people need access to different files, different portions of the same file, and so forth. Previous Table of Contents Next Products | Contact Us | About Us | Privacy | Ad Info | Home Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc. All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is prohibited. Read EarthWeb's privacy statement. To access the contents, click the chapter and section titles. Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C (cloth)
Brief Full Advanced Search Search Tips (Publisher: John Wiley & Sons, Inc.) Author(s): Bruce Schneier ISBN: 0471128457 Publication Date: 01/01/96 Search this book:
Go! Previous Table of Contents Next
----------- Table 10.4 Comparing Link-by-Link and End-to-End Encryption Link-by-link encryption Security within Hosts Message exposed in sending host Message exposed in intermediate nodes Role of User Applied by sending host Invisible to user Host maintains encryption One facility for all users Can be done in hardware All or no messages encrypted Implementation Concerns Requires one key per host pair Requires encryption hardware or software at each host Provides node authentication End-to-end encryption Message encrypted in sending host Message encrypted inintermediate nodes Applied by sending process User applies encryption User must find algorithm User selects encryption More easily done in software User chooses to encrypt or not, for each message Requires one key per user pair Requires encryption hardware or software at each node Provides user authentication If the encrypte...
View Full Document
- Fall '10
- Cryptography, Bruce Schneier, Applied Cryptography, EarthWeb, Search Search Tips