Abstract
In recent years, much effort has gone into the development of high bandwidth communication networks for use over relatively short (local) distances, e.g. an office, an industrial complex, a research laboratory, etc.. The high bandwidth of these networks allows many of the services now requiring separate networks such as facsimile, digitized voice, file transfer and interactive terminal data, to be integrated into a common transmission facility. Manufacturers are currently developing products which conform to the recently established IEEE 802 standard for Local Area Networks (LANs). This standard is based on the concept of a layered, “peer entity” communication protocol put forth in the International Standards Organization’s (ISO) seven layer model for Open Systems Interconnection (OSI).
In this paper we define the notions of secrecy and privacy as they relate to a LAN environment and the various services a network is required to provide such as data integrity, authentication and digital signature services. We also describe the cost-benefit tradeoff involved in attaining various levels of privacy and secrecy.
Chapter PDF
Similar content being viewed by others
Bibliography
D. Clark, K.T. Pogran, D.P. Reed, ‘An introduction to local area networks’, Proc. of IEEE, Vol. 66, No.11, Nov. 1978.
H. Zimmermann, ‘OSI reference model — The ISO model of architecture for Open Systems Interconnection’, IEEE Trans. on Comm., Vol. COM-28, Apr. 1980, pp. 425–432.
IEEE Project 802.1 Local Area Network Standard — Technical Report
IEEE Project 802 Local Area Network Standard, P802.2 Logical Link Control, Draft E, Sept 1983.
IEEE Project 802 Local Area Network Standard, P802.4, Draft IEEE Standard 802.4, Token Bus, Draft D, Dec. 1982.
IEEE Project 802 Local Area Network Standard, P802.5, Draft IEEE Standard 802.5, Token Ring, Dec. 1983.
J. Mark, J. Field, J. Wong, T. Todd, J. McMullan, G. Agnew, ‘WELNET A High Performance Local Area Communications Network’, CCNG report series, Dept. of Elec. Eng., Univ. of Waterloo, May 1983.
W. Diffie, M. Hellman, ‘Privacy and authentication: An introduction to cryptography’, Proc. of the IEEE, Vol. 67, March 1979, pp. 397–427.
S.T. Kent, ‘Security requirements and protocols for a broadcast scenario’, IEEE Trans. on Comm., Vol. COM-29, June 1981, pp. 778–786.
V. Voydock, S. Kent, ‘Security Mechanisms in High-Level Network Protocols’, Computing Surveys, Vol 15, June 1983.
D. Parker, ‘Computer abuse perpetrators and vulnerabilities of computer systems’, NCC’76, June 1976, New York, pp. 65–73.
N. Nielson, B. Ruder, D. Brandin, ‘Effective safeguards for computer system integrity’, NCC’76, June 1976, New York, pp. 75–84.
E. Gudes, H. Koch, ‘The application of cryptography for data base security’, NCC’76, June 1976, New York, pp. 97–107.
G. Purdy, ‘A high security log-in procedure’, Comm. of ACM, Vol. 17, Aug. 1974, pp. 442–445.
B. Walker, I. Blake, ‘Computer Security and Protection Structures’ Dowden, Hutchinson, Ross, Stroudsburg, Penn., 1977.
I. Ingemarsson, D.T. Tang, C.K. Wong, ‘A conference key distribution system’, IEEE Trans. on Info. Theory, Vol. IT-28, Sept. 1982, pp. 714–720.
W. Chou, A. Nilsson, ‘Key distribution and authentication procedures in internetworking environment’, Computer Networking Symposium, National Bureau of Standards, Maryland, Dec 1982, pp. 50–54.
‘Data Encryption Standard’, National Bureau of Standards, Federal Information Processing Standard (FIPS), Pub. No. 46, Jan. 1977.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1985 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Agnew, G.B. (1985). Secrecy and Privacy in a Local Area Network Environment. In: Beth, T., Cot, N., Ingemarsson, I. (eds) Advances in Cryptology. EUROCRYPT 1984. Lecture Notes in Computer Science, vol 209. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-39757-4_24
Download citation
DOI: https://doi.org/10.1007/3-540-39757-4_24
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-16076-2
Online ISBN: 978-3-540-39757-1
eBook Packages: Springer Book Archive