Link encryption


Link encryption

Link encryption is an approach to communications security that encrypts and decrypts all traffic at each end of a communications line (e.g. a teleprinter circuit or the line between two network switches). It contrasts with end-to-end encryption where messages are encrypted by the sender at the point of origin and only decrypted by the intended receiver. Link encryption offers a couple of advantages:

  • encryption is automatic so there is less opportunity for human error.
  • if the communications link operates continuously and carries an unvarying level of traffic, link encryption defeats traffic analysis.

On the other hand, end-to-end encryption ensures only authorized persons see the plaintext.

Link encryption can be used with end-to-end systems by superencrypting the messages.

Bulk encryption refers to encrypting a large number of circuits at once, after they have been multiplexed.



Wikimedia Foundation. 2010.

Look at other dictionaries:

  • link encryption — The application of online crypto operation to a link of a communications system so that all information passing over the link is encrypted in its entirety …   Military dictionary

  • Link Encryption — Online Verschlüsselung …   Acronyms

  • Link Encryption — Online Verschlüsselung …   Acronyms von A bis Z

  • Encryption Control Protocol — Das Protokoll ECP (Encryption Control Protocol) ist ein Begriff aus der Informatik. ECP ermöglicht bei einer PPP (Point to Point Protocol) eine Verschlüsselung. Beispielsweise wird mittels 3DESE (Triple DES Encryption Protocol Extension) eine… …   Deutsch Wikipedia

  • NSA encryption systems — The National Security Agency took over responsibility for all U.S. Government encryption systems when it was formed in 1952. The technical details of most NSA approved systems are still classified, but much more about its early systems has become …   Wikipedia

  • End-to-end encryption — Description End to end encryption (E2EE) encrypts clear (red) data at source with knowledge of the intended recipient, allowing the encrypted (black) data to travel safely through vulnerable channels (eg. public networks) to its recipient where… …   Wikipedia

  • Comparison of disk encryption software — This is a technical feature comparison of different disk encryption software. Contents 1 Background information 2 Operating systems 3 Features 4 Layering …   Wikipedia

  • AACS encryption key controversy — A controversy surrounding the AACS cryptographic key arose in April 2007 when the Motion Picture Association of America and the Advanced Access Content System Licensing Administrator, LLC (AACS LA) began issuing demand letters[1] to websites… …   Wikipedia

  • Proxy re-encryption — schemes are cryptosystems which allow third parties (proxies) to alter a ciphertext which has been encrypted for one party, so that it may be decrypted by another. Examples of UseBob could designate a proxy to re encrypt one of his messages that… …   Wikipedia

  • Homomorphic encryption — is a form of encryption where one can perform a specific algebraic operation on the plaintext by performing a (possibly different) algebraic operation on the ciphertext. Depending on one s viewpoint, this can be seen as a positive or negative… …   Wikipedia


Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”

We are using cookies for the best presentation of our site. Continuing to use this site, you agree with this.