|
|
|
|
In the 1980s, when computers were beginning to emerge in civil companies
as well as in military environments, it became increasingly necessary for
wireless and wired links, to carry not only the data of a single computer,
but complete bundles from multiple devices simultaneously,
often including speech and facsimile (fax) data.
Such devices are commonly known as bulk encryptors.
|
 |
Bulk encryption devices on this website
|
 |
 |
In the late 1990s and early 2000s, IP-based computer networks started
taking over the role of proprietary data networks and
digital telegraphy (telex)
in civil corporations as well as in the military domain.
It allows two computer networks to be interconnected securely, using
insecure (public) infrastructure as the transport medium.
This effectively creates a secure tunnel between the two networks.
Such a tunnel is also known as a Virtual Private Netword (VPN).
|
 |
IP Encryptors on this website
|
 |
 |
Although it has taken a long time for defence organisations to phase out
existing data networks, most of them have now migrated to
encrypted IP-based networks.
|
|
|
Any links shown in red are currently unavailable.
If you like the information on this website, why not make a donation?
© Crypto Museum. Created: Monday 12 February 2018. Last changed: Monday, 26 August 2024 - 09:17 CET.
|
 |
|
|
|