About cookies on this site Our websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising. For more information, please review your options. By visiting our website, you agree to our processing of information as described in IBM’sprivacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here.
Publication
Proceedings of the IEEE
Paper
Some Cryptographic Techniques for Machine-to-Machine Data Communications
Abstract
Some of the threats to the integrity of multiuser teleprocessing systems and to the data they contain can be countered by the use of cryptography. Stream-generator ciphers are not ideally suited for such an application, thus the use of block ciphers, which have the beneficial property of a strong nonlinear intersymbol dependence, is suggested. This property provides the means for automatic error detection for verifying the authenticity of terminal operators, and for ensuring message integrity. An experimental demonstration system has been constructed to illustrate protection features that can be provided for real applications. Copyright © 1975 by The Institute of Electrical and Electronics Engineers, Inc.