Abstract
The secure transport of messages was the concern of many early civilizations. Since then, different methods have been developed to assure that only the sender and the addressee would be able to read a message, while it would be illegible or without significant meaning to a third party. Today, this practice continues with more fervor. Wireless, wired, and optical communication networks are able to transport unimaginable amounts of data and thus privacy of information and security of the network are of the utmost concern because a good part of the transported information may be very sensitive and/or confidential. Confidentiality of information has been particularly popularized with the explosive growth of the Internet, which has touched most people's lives. However, from the outset, the Internet was based on open network architecture with computer-based nodes and without network security, and thus was vulnerable to attackers and hackers. Wireless networks transmit in unguarded space and thus are also subject to malicious actors. Dense wavelength-division multiplexing (DWDM) optical networks transport a massive aggregate traffic that has exceeded terabits per second per single fiber; therefore, the issues of information privacy and network security are equally important. As a result, the development of unbreakable cipher keys, cipher-key distribution, identification of malicious actors, source authentication, physical-link signature identification, countermeasures, and so forth has been the major thrust of research efforts with regard to cyber-security. This article focuses on cryptography, and is the first of a series of three articles on cryptography and security in communications. Subsequent articles will cover wireless and IP network security, as well as optical network security, quantum cryptography, and quantum-key distribution processes specific to optical networks.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.