Abstract
Z is a software system designed to provide media-transparent net- work services on a collection of UNIX® machines. These services are comprised of file transfer and command execution; Z preserves file own- ership on remote transfer, and more significantly, owner and group iden- tity when executing commands remotely. In order to secure known vulner- abilities in the system, enhancements were made. In particular, a cryptographically-derived checksum was added to the messages. After the initial implementation of the checksumming scheme, several iterations of performance improvement occurred. The result was unsatisfactory to the user community, so the checksum was removed. Instead, vulnerabilities were reduced by improved monitoring and maintenance procedures.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Matt Bishop, “An Application of a Fast Data Encryption Standard Implementation,” Computing Systems 1(3), pp. 221–254 (1988).
D.R. Denning, Cryptography and Data Security, Addison-Wesley (1982).
F. T. Grampp and R. H. Morris, “UNIX Operating System Security,” AT&T Bell Laboratories Technical Journal 63(8, Part 2), pp. 1649–1672 (October 1984).
A. G. Konheim, Cryptography: A Primer, Wiley-Interscience, New York (1981).
C. Meyer and S. Matyas, Cryptography: A New Dimension in Computer Data Security, Wiley-Interscience (1982).
R. Morris and K. Thompson, “UNIX Password Security,” Communications of the ACM 22, pp. 594–597 (November 1979).
J. A. Reeds and P. J. Weinberger, “File Security and the UNIX System Crypt command,” AT&T Bell Laboratories Technical Journal 63(8, Part 2), pp. 1673–1684 (October 1984).
D. M. Ritchie, “On the Security of UNIX,” in UNIX Programmer’s Manual, Section 2 (1983). AT&T Bell Laboratories
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1990 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Smith, J.M. (1990). Practical Problems with a Cryptographic Protection Scheme. In: Brassard, G. (eds) Advances in Cryptology — CRYPTO’ 89 Proceedings. CRYPTO 1989. Lecture Notes in Computer Science, vol 435. Springer, New York, NY. https://doi.org/10.1007/0-387-34805-0_7
Download citation
DOI: https://doi.org/10.1007/0-387-34805-0_7
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-0-387-97317-3
Online ISBN: 978-0-387-34805-6
eBook Packages: Springer Book Archive