skip to main content
article
Free Access

Context-agile encryption for high speed communication networks

Published:01 January 1999Publication History
Skip Abstract Section

Abstract

Different applications have different security requirements for data privacy, data integrity, and authentication. Encryption is one technique that addresses these requirements. Encryption hardware, designed for use in high-speed communications networks, can satisfy a wide variety of security requirements if the hardware implementation is key-agile, key length-agile, mode-agile, and algorithm-agile. Hence, context-agile encryption provides enhanced solutions to the secrecy, interoperability, and quality of service issues in high-speed networks. Moreover, having a single context-agile encryptor at an ATM aggregation point (such as a firewall) reduces hardware and administrative costs. While single-algorithm, key-agile encryptors exist, encryptors that are agile in a cryptographic robustness sense, are still research topics.

References

  1. The ATM Forum Technical Committee, ATM Security Specification Version 1.0, Straw Ballot, STR-SECURITY-01.00, The ATM Forum, Mountain View, CA, December 1997.Google ScholarGoogle Scholar
  2. The ATM Forum Technical Committee. Scaleable Parallel Interface for UTOPIA, ATM97-0537, ATM Forum, Mountain View, CA, December 1997.Google ScholarGoogle Scholar
  3. Data Encryption Standard (FIPS PUB 46), Federal Information Processing Standards Publication 46, National Bureau of Standards, Washington, D. C., January 15, 1977.Google ScholarGoogle Scholar
  4. Davies, Peter (ed.), The American Heritage Dictionary of the English Language, Paperback edition, Dell, New York, 1979.Google ScholarGoogle Scholar
  5. Denning, Dorothy Elizabeth Robling, Cryptography and Data Security, Addison-Wesley, Reading, MA, 1982. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. DES Modes of Operation (FIPS PUB 81), Federal Information Processing Standards Publication 81, National Bureau of Standards, Washington, D. C., December 2, 1980.Google ScholarGoogle Scholar
  7. Diffie, Whitfield, and Martin E. Hellman, "New Directions in Cryptography," IEEE Transactions on Information Theory, Vol. 1T-22, No. 6. p. 644-654, November 1976.Google ScholarGoogle Scholar
  8. http://www.nsa.gov:8080/programs/missi/kg75.html, June 1998.Google ScholarGoogle Scholar
  9. http://www.mcnc.org/HTML/ITD/ANR/Enigma2.html, November 1996.Google ScholarGoogle Scholar
  10. http://www.secantnet.com/product1.html, January 20, 1998.Google ScholarGoogle Scholar
  11. Kahn, David, The Codebreakers, Macmillan, New York, 1967.Google ScholarGoogle Scholar
  12. Pierson, Lyndon G., et al., Scalable End-to-End Encryption Technology for Supra-Gigabit/second Networking, SAND94-1622, Sandia National Laboratories, Albuquerque, NM, April 1997.Google ScholarGoogle Scholar
  13. Rivest, R. L., et al., "A Method for Obtaining Digital Signatures and Public Key Cryptosystems," Communications of the ACM, Vol. 21, No. 2, p. 120-126, February 1978. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Rueppel, Rainer A., "Stream Ciphers," in Gustavus J. Simmons (ed.), Contemporary Cryptology: The Science of Information Integrity, IEEE, New York, 1992.Google ScholarGoogle Scholar
  15. Schneier, Bruce, Applied Cryptography, 2nd edition, John Wiley & Sons, New York, 1996.Google ScholarGoogle Scholar
  16. Semancik, William, et al., "Cell Level Encryption for ATM Networks and Some Results from Initial Testing," Conference Proceedings, DoD Fiber Optics '94, March 1994.Google ScholarGoogle Scholar
  17. Sholander, Peter, et al., "The Effect of Algorithm-Agile Encryption on ATM Quality of Service," GLOBECOM 97, IEEE, Piscataway, NJ, November 1997.Google ScholarGoogle Scholar
  18. Tarman, Thomas D., et al., "Algorithm-Agile Encryption in ATM Networks," IEEE Computer, Vol. 31, No. 9, p. 57-64, September 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Tarman, Thomas D., et al., Final Report for the Protocol Extensions for ATM Security Laboratory Directed Research and Development Project, SAND96-0657, Sandia National Laboratories, Albuquerque, NM, March 1996.Google ScholarGoogle Scholar
  20. Tarman, Thomas D., et al., Final Report for the Robustness-Agile Asynchronous Transfer Mode (ATM) Encryption Laboratory Directed Research and Development Project, SAND97-2902, Sandia National Laboratories, Albuquerque, NM, November 1997.Google ScholarGoogle Scholar
  21. Trombley, G. J. and M. O. Bean, Technology Trends Influencing High-Speed INFOSEC Requirements, R2 Technical Report R22-003-98, National Security Agency, Ft. Meade, MD, February 1998.Google ScholarGoogle Scholar
  22. Witzke, Edward L., and Lyndon G. Pierson, "Key Management for Large Scale End-to-End Encryption," Proceedings, 28th Annual International Carnahan Conference on Security Technology, IEEE, New York, October 1994.Google ScholarGoogle Scholar
  23. Witzke, Edward L., and Lyndon G. Pierson, "The Role of Decimated Sequences in Scaling Encryption Speeds Through Parallelism," Conference Proceedings of the 1996 International Phoenix Conference on Computers and Communications, IEEE, New York, 1996.Google ScholarGoogle Scholar

Index Terms

  1. Context-agile encryption for high speed communication networks
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM SIGCOMM Computer Communication Review
        ACM SIGCOMM Computer Communication Review  Volume 29, Issue 1
        January 1999
        104 pages
        ISSN:0146-4833
        DOI:10.1145/505754
        Issue’s Table of Contents

        Copyright © 1999 Authors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 January 1999

        Check for updates

        Qualifiers

        • article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader