Abstract

As the US Army evolves its concepts for the tactical battlefield of the 21/sup st/ century, a comprehensive system architecture is unfolding. Yet our combat forces face many potentially sophisticated adversaries who will seek out and attack any vulnerabilities in our combat systems and communications infrastructure they can identify. This paper examines the types of adversaries, the threats they pose and the vulnerabilities most likely targeted within the Army's Warfighter Information Network (WIN). An overview is provided of how cryptographic methods may be used to mitigate WIN vulnerabilities. Included is a review of secret key and public key cryptographic methods and their relative advantages and disadvantages. We conclude by identifying a number of security related issues that require further consideration.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call