1999
DOI: 10.1145/505754.505757
|View full text |Cite
|
Sign up to set email alerts
|

Context-agile encryption for high speed communication networks

Abstract: IntroductionDifferent applications have different security requirements for data privacy, data integrity, and authentication. Encryption is one technique that addresses these requirements. Encryption can protect proprietary information as it passes from one end of a complex computer network to the other, even through untrusted intermediate systems, such as on the Internet. Encryption technology has many other uses including encrypting disk files and producing digital signatures.These various applications often… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0

Year Published

1999
1999
2000
2000

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 6 publications
(11 reference statements)
0
9
0
Order By: Relevance
“…This can be an arbitrary combination of DES, TripleDES, and plaintext communication, respectively ECB and CBC operational mode for each VC and communication direction transmit or receive. Providing arbitrary combinations of encryption algorithms (DES or TripleDES) and operational modes (ECB or CBC) is referred to as algorithm agile encryption [28], robustness agile encryption respectively [29]. HADES employs on-chip session key storage and management blocks which utilise CAM techniques to identify a certain encryption context, and random access memory (RAM) techniques to store the session keys and the initialisation vectors (IV s).…”
Section: The Scan Project Results and Findingsmentioning
confidence: 99%
“…This can be an arbitrary combination of DES, TripleDES, and plaintext communication, respectively ECB and CBC operational mode for each VC and communication direction transmit or receive. Providing arbitrary combinations of encryption algorithms (DES or TripleDES) and operational modes (ECB or CBC) is referred to as algorithm agile encryption [28], robustness agile encryption respectively [29]. HADES employs on-chip session key storage and management blocks which utilise CAM techniques to identify a certain encryption context, and random access memory (RAM) techniques to store the session keys and the initialisation vectors (IV s).…”
Section: The Scan Project Results and Findingsmentioning
confidence: 99%
“…In [9], algorithm-agile encryption is introduced, where the encryption unit not just switches between keys, it even enables different encryption algorithms to be applied to different VCs. Finally, the concept of a ATM confidentiality system for 10 Gbps OC-192 is discussed in [10].…”
Section: Key Publications On Atm Securitymentioning
confidence: 99%
“…Further requirements may even strive for assigning different encryption algorithms to each VC, such as DES and Triple-DES, which is referred to as algorithm-agile encryption [8]. Actually, the encryption unit presented in this paper allows to uniquely assign the encryption context including the operational mode to each connection which is called context-agile encryption [6].…”
Section: Introductionmentioning
confidence: 99%