Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Secure communication
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{short description|Anonymous communicating between two entities}} {{essay|date=January 2015}} '''Secure communication''' is when two entities are communicating and do not want a third party to listen in. For this to be the case, the entities need to communicate in a way that is unsusceptible to [[eavesdropping]] or [[Signals intelligence|interception]].<ref>D. P. Agrawal and Q-A. Zeng, ''Introduction to Wireless and Mobile Systems'' (2nd Edition, published by Thomson, April 2005) {{ISBN|978-0-534-49303-5}}</ref><ref>J.K. and K. Ross, ''Computer Networking'' (2nd Ed, Addison Wesley, 2003) {{ISBN|978-0-321-17644-8}}</ref> Secure communication includes means by which people can share information with varying degrees of certainty that third parties cannot intercept what is said. Other than spoken face-to-face communication with no possible eavesdropper, it is probable that no communication is guaranteed to be secure in this sense, although practical obstacles such as legislation, resources, technical issues (interception and encryption), and the sheer volume of communication serve to limit [[surveillance]]. With many communications taking place over long distance and mediated by technology, and increasing awareness of the importance of interception issues, technology and its compromise are at the heart of this debate. For this reason, this article focuses on communications mediated or intercepted by technology. Also see ''[[Trusted Computing]]'', an approach under present development that achieves security in general at the potential cost of compelling obligatory trust in corporate and government bodies.
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)