From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: f45dfa39877fbd4311d43664c71019ee128f7baabd5e59dc12639a3e642786cf
Message ID: <1.5.4.32.19961209182328.00679df8@pop.pipeline.com>
Reply To: N/A
UTC Datetime: 1996-12-09 18:26:48 UTC
Raw Date: Mon, 9 Dec 1996 10:26:48 -0800 (PST)
From: John Young <jya@pipeline.com>
Date: Mon, 9 Dec 1996 10:26:48 -0800 (PST)
To: cypherpunks@toad.com
Subject: Baran on Net Security
Message-ID: <1.5.4.32.19961209182328.00679df8@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
RAND has put on it Web site eleven "classics" on distributed
communications, most of them by Paul Baran. They offer good
background to current debate on secrecy, security and
cryptography. Here are the contents of No. 9 on security.
http://www.rand.org/publications/RM/RM3765/
Memorandum
RM-3765-PR
August 1964
On Distributed Communications:
IX Security, Secrecy, and Tamper-Free Considerations
Paul Baran
Contents, Preface, Summary, Foreword
I. Introduction
II. The Paradox of the Secrecy About Secrecy
The Assumption of a Clear Dichotomy Between Classified
and Unclassified Subject Matter
Cost and Result of Present-Day Cryptographic Equipment
On Secrecy of Secrecy
III. Some Fundamentals of Cryptography
Digital Transmission
Layers of Encryption
IV. Implications for the Distributed Network System
Link-by-Link Cryptography in the Distributed Network
End-to-End Cryptography in the Distributed Network
Genealogy of the Keys
Generation and Distribution of Keys
Protection Offered by Semi-Random Path Choice
V. A "Devil's Advocate" Examination
Appendix
Use of a Function of N-Boolean Variables as a Second-Order
Modifier for "Next-Key" Generation
Return to December 1996
Return to “John Young <jya@pipeline.com>”
1996-12-09 (Mon, 9 Dec 1996 10:26:48 -0800 (PST)) - Baran on Net Security - John Young <jya@pipeline.com>