Page 283 - Anatomy of a Robot
P. 283

09_200256_CH09/Bergren   4/17/03  11:24 AM  Page 268
                             268 CHAPTER NINE
                             encryption and authentication are outlined in the following URLs. Many computer soft-
                             ware libraries contain subroutines to support secure communications. If the data stream
                             moves too fast for software encryption, hardware chips are available that can encrypt
                             the information faster. Popular encryption standards are listed at www.cs.auckland
                             .ac.nz/ pgut001/links/standards.html  and  include  the  Data  Encryption  Standard
                                                                   ™
                             (DES), RSA, and Pretty Good Privacy (PGP) .
                             DATA ENCRYPTION STANDARD (DES)
                             DES has won the backing of the government and is present in many commercial trans-
                             actions today. The calculation methods are fairly straightforward and chipsets are avail-
                             able for high-speed implementations. Further information on DES can be found at the
                             following URLs:

                                 http://axion.physics.ubc.ca/crypt.html#aDES
                                 www.tropsoft.com/strongenc/des.htm
                                 www.tropsoft.com/strongenc/des3.htm


                             RSA

                             RSA security is based on the fact that it’s very difficult to factor large numbers. If a
                             hacker could factor a huge number in less than a few years, the hacker could break into
                             the communications link. So far, it’s proven too difficult (see www.rsasecurity.com/).



                             PRETTY GOOD PRIVACY (PGP)™
                                 ™
                             PGP security is also based on difficult mathematical calculations and is offered in sev-
                             eral versions, as detailed at the following sites:

                                 www.pgp.com/
                                 www.neiu.edu/ ncaftori/PGP.htm
                                 www.scramdisk.clara.net/pgpfaq.html
                               Dos attacks happen when a determined hacker sends packets to the robot that it can-
                             not handle. Some DoS attacks involve sending packets with an illegal data structure;
                             other DoS attacks involve sending too many packets so the channel gets clogged up. Be
                             sure your software can handle packets with illegal structures, and consider testing it
                             with simulated DoS attack data. Some web sites speak to this issue, such as www.
                             geocities.com/solarsistem/gif/docs/dos.htm  and  www-arc.com/sara/coe/distributed_
                             denial_of_service.html
   278   279   280   281   282   283   284   285   286   287   288