Abstract
Construction of a simple local area network encapsulation security protocol is discussed. The paper illustrates the way that the key distribution scheme, the confidentiality algorithm, and the integrity algorithm drive the protocol construction. A Needham/Schroeder based key distribution scheme, DES Cipher Block Chaining, and the Message Authentication Code are used as building blocks for a sample protocol. The sample protocol provides data origin authentication, confidentiality, and integrity.
This is a preview of subscription content, log in via an institution.
Preview
Unable to display preview. Download preview PDF.
References
Xerox Corporation. Authentication Protocol. Xerox System Integration Standard. Stamford, Connecticut; May 1986;XNSS 098605.
Needham, R. A.; Schroeder, M. D. "Using Encryption for Authentication in Large Networks of Computers" Communications of the Association of Computing Machinery 21, 12; December 1978; pp. 995–999.
National Bureau of Standards. "The Data Encryption Standard." Federal Information Processing Standards Publication (FIPS PUB) 46; January 1977; National Technical Information Service, Springfield, Virginia.
National Bureau of Standards. "DES Modes of Operation." Federal Information Processing Standards Publication (FIPS PUB) 81; December 1980; National Technical Information Service, Springfield, Virginia.
National Bureau of Standards. "Guidelines for Implementing and Using the NBS Data Encryption Standard." Federal Information Processing Standards Publication (FIPS PUB) 74; April 1981; National Technical Information Service, Springfield, Virginia.
National Bureau of Standards. "Computer Data Authentication." Federal Information Processing Standards Publication (FIPS PUB) 113; May 1985; National Technical Information Service, Springfield, Virginia.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1989 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Housley, R. (1989). Encapsulation security protocol design for local area networks. In: Berson, T.A., Beth, T. (eds) Local Area Network Security. LANSEC 1989. Lecture Notes in Computer Science, vol 396. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-51754-5_34
Download citation
DOI: https://doi.org/10.1007/3-540-51754-5_34
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-51754-2
Online ISBN: 978-3-540-46802-8
eBook Packages: Springer Book Archive