Skip to Main Content
Idaho State University home

Glossary

Filter:
# A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Traffic-Flow Security
  • Measures used to conceal the presence of valid messages in an on-line cryptosystem or secure communication system. Note: Encryption of sending and receiving addresses and causing the circuit to appear busy at all times by sending dummy traffic are two methods of traffic-flow security. A more common method is to send a continuous encrypted signal, irrespective of whether traffic is being transmitted. 2. The protection resulting from features, inherent in some cryptoequipment, which conceal the presence of valid messages on a communications circuit; normally achieved by causing the circuit to appear busy at all times. (JCS1-DoD) See also cryptology, electronic warfare.