Cryptographic Solution to a Multilevel Security Problem

  • Selim G. Akl
  • Peter D. Taylor


A scheme based on cryptography is proposed for enforcing multilevel security in a system where hierarchy is represented by a partially ordered set (or poset). Straightforward implementation of the scheme requires users highly placed in the hierarchy to store a large number of cryptographic keys. A time-versus-storage trade-off is then described for addressing this key management problem.


Central Authority Hasse Diagram Modular Exponentiation Data Encryption Standard Security Class 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    G. H. MacEwen, Secure information flow in distributed systems, Proceedings of the Eleventh Biennial Symposium on Communications, Queen’s University, Kingston, Ontario (1982).Google Scholar
  2. 2.
    D. E. R. Denning, “Cryptography And Data Security”, Addison-Wesley, Reading, Massachusetts (1982).Google Scholar
  3. 3.
    A. G. Konheim, “Cryptography: A Primer”, John Wiley & Sons, Toronto (1981).Google Scholar
  4. 4.
    C. Meyer and S. M. Matyas, “Cryptography - A New Dimension In Computer Security”, John Wiley & Sons, New York (1982).Google Scholar
  5. 5.
    G. J. Simmons, Symmetric and asymmetric encryption, Comput. Surv. 11: 305 (1977).CrossRefGoogle Scholar
  6. 6.
    Data Encryption Standard, Federal Information Processing Standard (FIPS), Publication 46, National Bureau of Standards, U.S. Department of Commerce (1977).Google Scholar
  7. 7.
    R. L. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Commun. ACM 21: 120 (1978).CrossRefGoogle Scholar
  8. 8.
    M. O. Rabin, Digitalized signatures and public-key functions as intractable as factorization, Technical Report MIT/LCS/TR-212, Laboratory for Computer Science, Massachusetts Institute of Technology, Cambridge, Massachusetts (1979).Google Scholar
  9. 9.
    H. C. Williams, A modification of the RSA public-key encryption procedure, IEEE Trans. Inform. Theory IT26: 726 (1980).CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 1983

Authors and Affiliations

  • Selim G. Akl
    • 1
  • Peter D. Taylor
    • 1
  1. 1.Queen’s UniversityKingstonCanada

Personalised recommendations