
Proceedings Paper
Cost-sensitive hardware encryption of existing wireless communication networksFormat | Member Price | Non-Member Price |
---|---|---|
$17.00 | $21.00 |
Paper Abstract
In the defense industry it is becoming necessary in some cases to encrypt an existing unencrypted or weakly encrypted
wireless communication link. Factors affecting such a requirement include classification of data that was not previously
classified, sustaining an aging system that is no longer state-of-the-art, repurposing a communication link for a new
function requiring encryption, or a change in the acceptability of an existing encryption algorithm. In these cases it is
usually desirable to insert encryption and decryption capabilities into the communication network without drastically
changing the function, structure, or characteristics of the existing network. The easiest way to accomplish this is usually
through a software update. However, that is not always possible for various reasons which will be explained. This paper
will discuss the general process by which encryption can be implemented using electronics hardware, and will place an
emphasis on reducing costs along the way.
Paper Details
Date Published: 18 June 2012
PDF: 6 pages
Proc. SPIE 8359, Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense XI, 83590F (18 June 2012); doi: 10.1117/12.918273
Published in SPIE Proceedings Vol. 8359:
Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense XI
Edward M. Carapezza, Editor(s)
PDF: 6 pages
Proc. SPIE 8359, Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense XI, 83590F (18 June 2012); doi: 10.1117/12.918273
Show Author Affiliations
Ben Kaminski, NuWaves Engineering (United States)
Adam Wannemacher, NuWaves Engineering (United States)
Published in SPIE Proceedings Vol. 8359:
Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense XI
Edward M. Carapezza, Editor(s)
© SPIE. Terms of Use
