home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.security.misc
- Path: sparky!uunet!cs.utexas.edu!zaphod.mps.ohio-state.edu!saimiri.primate.wisc.edu!ames!agate!doc.ic.ac.uk!cc.ic.ac.uk!imperial.ac.uk!vulture
- From: vulture@imperial.ac.uk (Thomas Sippel - Dau)
- Subject: Re: Encryption in a routed network?
- Message-ID: <1992Nov5.153609.3206@cc.ic.ac.uk>
- Sender: vulture@carrion.cc.ic.ac.uk (Thomas Sippel - Dau)
- Nntp-Posting-Host: cscgc
- Reply-To: cmaae47@imperial.ac.uk
- Organization: Imperial College of Science, Technology and Medicine
- References: <1992Nov4.092951.49@ntet.nctr.fda.gov>
- Date: Thu, 5 Nov 92 15:36:08 GMT
- Lines: 24
-
- In article <1992Nov4.092951.49@ntet.nctr.fda.gov>, rbowen@ntet.nctr.fda.gov writes:
- - Are there any encryption devices that would allow the passing of
- - encrypted traffic across a routed network? I have seen devices such
- - as DEC's DECSNC, but it only will work in a bridged environment, not
- - a routed one.
-
- Which means it is an inept implementation. Encryption should be done at
- presentation level, after normalization and compression.
-
- If you want to avoid listeners at network or data link layers to analyse
- your traffic patterns you could make sure that you connect over several
- networks and hope your receiver dos so as well, and will consolidate the
- messages.
-
- For more info on layered communications, see A. S. Tanenbaum,
- Computer Networks, Prentice Hall.
-
- Thomas
- --
- *** This is the operative statement, all previous statements are inoperative.
- * email: cmaae47 @ ic.ac.uk (Thomas Sippel - Dau) (uk.ac.ic on Janet)
- * voice: +44 71 589 5111 x4937 or 4934 (day), or +44 71 823 9497 (fax)
- * snail: Imperial College of Science, Technology and Medicine
- * The Center for Computing Services, Kensington SW7 2BX, Great Britain
-