1996-12-09 - Baran on Net Security

Header Data

From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: f45dfa39877fbd4311d43664c71019ee128f7baabd5e59dc12639a3e642786cf
Message ID: <1.5.4.32.19961209182328.00679df8@pop.pipeline.com>
Reply To: N/A
UTC Datetime: 1996-12-09 18:26:48 UTC
Raw Date: Mon, 9 Dec 1996 10:26:48 -0800 (PST)

Raw message

From: John Young <jya@pipeline.com>
Date: Mon, 9 Dec 1996 10:26:48 -0800 (PST)
To: cypherpunks@toad.com
Subject: Baran on Net Security
Message-ID: <1.5.4.32.19961209182328.00679df8@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


RAND has put on it Web site eleven "classics" on distributed
communications, most of them by Paul Baran. They offer good 
background to current debate on secrecy, security and 
cryptography. Here are the contents of No. 9 on security.

     http://www.rand.org/publications/RM/RM3765/

Memorandum
RM-3765-PR
August 1964

On Distributed Communications:
IX Security, Secrecy, and Tamper-Free Considerations

Paul Baran


Contents, Preface, Summary, Foreword

I.   Introduction

II.  The Paradox of the Secrecy About Secrecy 

     The Assumption of a Clear Dichotomy Between Classified 
     and Unclassified Subject Matter
     Cost and Result of Present-Day Cryptographic Equipment
     On Secrecy of Secrecy

III. Some Fundamentals of Cryptography 

     Digital Transmission
     Layers of Encryption

IV.  Implications for the Distributed Network System 

     Link-by-Link Cryptography in the Distributed Network
     End-to-End Cryptography in the Distributed Network
     Genealogy of the Keys
     Generation and Distribution of Keys
     Protection Offered by Semi-Random Path Choice

V.   A "Devil's Advocate" Examination

Appendix

Use of a Function of N-Boolean Variables as a Second-Order
Modifier for "Next-Key" Generation







Thread