Skip to Main Content
Idaho State University

Glossary

Filter:
# A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
T
T&E
TA
TAG
Tap
Tar
TCB
TCD
TCS
TCU
TD
TDM
TED
Tee
TEI
TEK
TEP
TFM
TFS
TLA
TLS
TMC
TNI
Toy
TPC
TPI
TRB
TRR
TSK
Tty
TV
TWX
Traffic-Flow Security
  • Measures used to conceal the presence of valid messages in an on-line cryptosystem or secure communication system. Note: Encryption of sending and receiving addresses and causing the circuit to appear busy at all times by sending dummy traffic are two methods of traffic-flow security. A more common method is to send a continuous encrypted signal, irrespective of whether traffic is being transmitted. 2. The protection resulting from features, inherent in some cryptoequipment, which conceal the presence of valid messages on a communications circuit; normally achieved by causing the circuit to appear busy at all times. (JCS1-DoD) See also cryptology, electronic warfare.