How to insure that data acquired to verify treaty compliance are trustworthy
Article Abstract:
An authentication methodology has been devised to assure the validity of messages or data in a data acquisition system for the verification of a nuclear test ban treaty. The strategy to prevent deceptive, erroneous, or manipulated data involves the concatenation of two or more authentication channels. No data need be kept secret from any party involved, and no less than collusion by all parties involved could keep any data secret or generate forged data. The specific properties of the system include: no messages can be forged that would be accepted as authentic by others, no part of a message is concealable, all parties can independently verify any messages, no action by any party can lessen confidence in the system by others, and the hardware supplier can gain no benefit.
Publication Name: Proceedings of the IEEE
Subject: Electronics
ISSN: 0018-9219
Year: 1988
User Contributions:
Comment about this article or add new information about this topic:
The Data Encryption Standard: past and future
Article Abstract:
The US National Bureau of Standards (NBS) public Data Encryption Standard (DES) is the most widely known and used single-key cryptographic algorithm, and the only one endorsed by the US government. The DES algorithm includes a set of functions that transforms one 64-bit input into a 64-bit output, with over 70 quadrillion possible transformations enabled by a 56-bit key. The algorithm is used for data encryption, data authentication, or both for such applications as data storage, electronic mail, electronic funds transfer, and electronic business data interchange. The US National Security Agency (NSA) initiated a Commercial COMSEC Endorsement Program to provide new non-public cryptographic algorithms that would be specifically designed and controlled by the NSA.
Publication Name: Proceedings of the IEEE
Subject: Electronics
ISSN: 0018-9219
Year: 1988
User Contributions:
Comment about this article or add new information about this topic:
Supervisory control and data acquisition
Article Abstract:
All modern utility control systems are based on the fundamental building blocks of data acquisition, data processing for the operator, and operator control of remote devices. Supervisory Control and Data Acquisition Systems (SCADA) accomplish these functions. An overview of the functions and fundamentals SCADA is provided including a description of the key man-machine interface. Problems and issues discussed include: system obsolescence, message standards and system performance testing. Current trends such as improved man-machine interface, standard systems, distributed processing, and standard software are pointed out. The use of interchangeable parts is seen as a future direction.
Publication Name: Proceedings of the IEEE
Subject: Electronics
ISSN: 0018-9219
Year: 1987
User Contributions:
Comment about this article or add new information about this topic:
- Abstracts: Calibration case study of natural source electromagnetic array data recorded over a well in Oregon. Lateral Electromagnetic Waves Along Plane Boundaries: A Summarizing Approach
- Abstracts: Synchronous data flow. Performance of coherent optical receivers. The synchronous data flow programming language LUSTRE
- Abstracts: On coupling multi-systems through data sharing. Computation of single-tone spurious effects in radio communication systems
- Abstracts: Spaceborne radar measurement of wind velocity over the ocean - an overview of the NSCAT Scatterometer system. Overview of MM and UTD methods at the Ohio State University
- Abstracts: Man-machine interface problems in designing air traffic control systems. Transient mean and variance of overflow traffic in a loss system