International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004. 2004
DOI: 10.1109/itcc.2004.1286715
|View full text |Cite
|
Sign up to set email alerts
|

Streaming encryption for a secure wavelength and time domain hopped optical network

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2006
2006
2006
2006

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…In one application [1], the optical switches require cryptographically secure random numbers to generate the encrypted stream of data. For this purpose, the Advanced Encryption Standard algorithm [2] designed for over 30 Gbits/s throughput is required to generate the sequences of random numbers.…”
Section: Introductionmentioning
confidence: 99%
“…In one application [1], the optical switches require cryptographically secure random numbers to generate the encrypted stream of data. For this purpose, the Advanced Encryption Standard algorithm [2] designed for over 30 Gbits/s throughput is required to generate the sequences of random numbers.…”
Section: Introductionmentioning
confidence: 99%
“…In [60], a proposal for a coding scheme directed toward providing security at the physical The approach is based on using a switching matrix (16X16) in the active mode to achieve the permutation process, and could suffer scalability problems for higher size switching matrices. In addition, using encryption techniques via hardware implementation makes the system more rigid for future growth and changes since this will affect multiplexers, demultiplexers, and operation of switches.…”
Section: Literature Review For Other Protection Methods In Optical Nementioning
confidence: 99%
“…In addition, using encryption techniques via hardware implementation makes the system more rigid for future growth and changes since this will affect multiplexers, demultiplexers, and operation of switches. The proposed security scheme in [60] did not address different security levels that can coexist in the same network.…”
Section: Literature Review For Other Protection Methods In Optical Nementioning
confidence: 99%