Authentication and Encryption
The advent of packet-routed networks and the necessity of sharing transport channels
has increased the need for authentication and encryption. The more robust we make
the authentication and encryption process, the more value we confer. However, the
cost of robust authentication and encryption is an increase in overhead, in terms of
processor bandwidth, processing delay, and memory/code footprint. Authentication
can be compromised by delay and delay variability, particularly when time-sensitive
challenge/response algorithms are used. Network quality and authentication and
encryption integrity are therefore intimately related.
This chapter addresses these issues in depth. It also presents several sections of
working examples—known dilemmas and possible solutions.
205 times read
|No matching news for this article
Did you enjoy this article?
(total 0 votes)