Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
A recent report by Drexel University [Eisenstein et al., 2003b] addresses the complex issue of life safety systems tied into the BCS—a scenario that does not fit well with the scenarios presented above. Presently all life safety systems (fire) are in parallel to the HVAC and other elements of the BCS, with separate wiring and only connections at the highest controller level to allow the BCS to get status information. Can this parallel network be integrated with the non-life safety BCS? It may not be possible due to code requirements that the life safety system be always available and have. | Cryptography and Network Security Bhaskaran Raman Department of CSE IIT Kanpur Reference Whitfield Diffie and Martin E. Hellman Privacy and Authentication An Introduction to Cryptography in Proc. IEEE vol. 67 no.3 pp. 397 - 427 1979 Fundamentals of Wired and Wireless Networks Kameswari Chebrolu and Bhaskaran Raman 09-13 May 2005 Cryptography Fundamentals Privacy versus Authentication - Privacy preventing third party from snooping - Authentication preventing impostering Two kinds of authentication - Guarantee that no third party has modified data - Receiver can prove that only the sender originated the data Digital Signature E.g. for electronic transactions Fundamentals of Wired and Wireless Networks Kameswari Chebrolu and Bhaskaran Raman 09-13 May 2005 Cryptographic Privacy Encrypt before sending decrypt on receiving - Terms plain text and cipher text Two components key and the algorithm - Should algorithm be secret Yes for military systems no for commercial systems Key distribution must be secure Fundamentals of Wired and Wireless Networks Kameswari Chebrolu and Bhaskaran Raman 09-13 May .