Abstract:
One of possible approaches to the construction of secure connections permitting the transmission of confidential information through public networks is considered. We discuss conditions which are necessary for the approval of cryptographic quality of the protection mechanism. Protocols of remote control and public key distribution are used as examples.
Key words:information security, public networks, secured connections, public key distribution.