Key technologies in information security - A review

被引:0
作者
Athisha, G [1 ]
Sankaranarayanan, K
机构
[1] PSNA Coll Engn & Technol, Dept ECE, Dindigul 6246222, India
[2] AC Coll Engn & Technol, Dept ECE, Karaikkudi 630004, Tamil Nadu, India
关键词
Authentication - Block-permutators - Communication infrastructure - Cryptographic engines;
D O I
10.1080/02564602.2005.11657899
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The accelerating development of communication technologies has increased the speed, quality and ease of global communication. The evolution of networking technologies show that the, Internet is the single integrated communication infrastructure. But as dependability on networks increases, new security vulnerabilities are developed every minute. To defend ourselves from cyberthreats, appropriate information security measures have to be developed. Earlier work on information security dates back to 4000 years with the development of cryptography. Firewalls, proxying and authentication systems constitute the next phase. The protection of copyrights and intellectual properties of digital entertainment contents and business transaction informations have also, to be considered as serious issues. Compromising the security of routing infrastructure may lead to invasion of the goal of a communication system. The next generation embedded, processors can implement the cryptographic engines at wire-speed. This paper presents a brief review of some of the key technologies used to secure the valuable information.
引用
收藏
页码:173 / 181
页数:9
相关论文
共 38 条
[1]  
[Anonymous], IEEE ACM T NETWORKIN
[2]  
ATHISHA G, 2003, P NAT C CONCOURSE 20, P51
[3]  
BELLOVIN S, 2000, 202L RFC INT ENG TAS
[4]  
BRENDAN C, 2003, IEEE COMPUTER MA JUL, P72
[5]  
CHAKRABARTI A, 2003, LCN 2002
[6]  
CHAMOUNT P, 2003, IEEE COMPUTER MA APR, P68
[7]  
CHOI KH, 2004, P 7 INT S PAR ARCH A
[8]  
COMER DE, 2003, NETWORK SYSTEM DESIG, P157
[9]  
DAWN XD, 2001, P IEEE INFOCOM
[10]  
DEAN D, 2002, ACM T INFORM SYSTEM, V5