Share Email Print
cover

Proceedings Paper

Cost-sensitive hardware encryption of existing wireless communication networks
Author(s): Ben Kaminski; Adam Wannemacher
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

In the defense industry it is becoming necessary in some cases to encrypt an existing unencrypted or weakly encrypted wireless communication link. Factors affecting such a requirement include classification of data that was not previously classified, sustaining an aging system that is no longer state-of-the-art, repurposing a communication link for a new function requiring encryption, or a change in the acceptability of an existing encryption algorithm. In these cases it is usually desirable to insert encryption and decryption capabilities into the communication network without drastically changing the function, structure, or characteristics of the existing network. The easiest way to accomplish this is usually through a software update. However, that is not always possible for various reasons which will be explained. This paper will discuss the general process by which encryption can be implemented using electronics hardware, and will place an emphasis on reducing costs along the way.

Paper Details

Date Published: 18 June 2012
PDF: 6 pages
Proc. SPIE 8359, Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense XI, 83590F (18 June 2012); doi: 10.1117/12.918273
Show Author Affiliations
Ben Kaminski, NuWaves Engineering (United States)
Adam Wannemacher, NuWaves Engineering (United States)


Published in SPIE Proceedings Vol. 8359:
Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense XI
Edward M. Carapezza, Editor(s)

© SPIE. Terms of Use
Back to Top