Customers of Asynchronous Transfer Mode (ATM) services may need a variety of data authenticity and privacy assurances. Cryptographic methods can be used to assure authenticity and privacy, but are hard to scale for implementation at high speed. The incorporation of these methods into computer networks can severely impact functionality, reliability, and performance. To study these trade-offs, a prototype encryptor/decryptor was developed. This effort demonstrated the viability of implementing certain encryption techniques in high speed networks. The research prototype processes ATM cells in a SONET OC-3 payload. This paper describes the functionality, reliability, security, and performance design trade-offs investigated with the prototype
In today's world of integrating voice, video and data into a single network, Asynchronous Transfer M...
Cryptography can be considered as a special application of coding schemes. High speed execution of E...
Due to the character of the original source materials and the nature of batch digitization, quality ...
BISDN services will involve the integration of high speed data, voice, and video functionality deliv...
This effort studied the integration of innovative methods of key management crypto synchronization, ...
Broadband networks based on the asynchronous transfer mode (ATM) are emerging rapidly. Both the tech...
Asynchronous Transfer Mode (ATM) users often open multiple ATM Virtual Circuits (VCs) to multiple AT...
International audienceThe ATM Forum international consortium recently approved the first version of ...
This is an interim report on the investigations into securing Asynchronous Transfer Mode (ATM) netwo...
There is increasing deployment of asynchronous transmission mode or ATM as the preferred data transm...
Different applications have different security requirements for data privacy, data integrity, and au...
Many applications envisioned for ultra-high-speed networks require cryptographic transformations for...
There is a growing interest in the development of broadband services and networks for commercial use...
Asynchronous Transfer Mode (ATM) technology is currently receiving extensive attention in the comput...
The following article presents the results on the impact of encryption algorithms and the cryptograp...
In today's world of integrating voice, video and data into a single network, Asynchronous Transfer M...
Cryptography can be considered as a special application of coding schemes. High speed execution of E...
Due to the character of the original source materials and the nature of batch digitization, quality ...
BISDN services will involve the integration of high speed data, voice, and video functionality deliv...
This effort studied the integration of innovative methods of key management crypto synchronization, ...
Broadband networks based on the asynchronous transfer mode (ATM) are emerging rapidly. Both the tech...
Asynchronous Transfer Mode (ATM) users often open multiple ATM Virtual Circuits (VCs) to multiple AT...
International audienceThe ATM Forum international consortium recently approved the first version of ...
This is an interim report on the investigations into securing Asynchronous Transfer Mode (ATM) netwo...
There is increasing deployment of asynchronous transmission mode or ATM as the preferred data transm...
Different applications have different security requirements for data privacy, data integrity, and au...
Many applications envisioned for ultra-high-speed networks require cryptographic transformations for...
There is a growing interest in the development of broadband services and networks for commercial use...
Asynchronous Transfer Mode (ATM) technology is currently receiving extensive attention in the comput...
The following article presents the results on the impact of encryption algorithms and the cryptograp...
In today's world of integrating voice, video and data into a single network, Asynchronous Transfer M...
Cryptography can be considered as a special application of coding schemes. High speed execution of E...
Due to the character of the original source materials and the nature of batch digitization, quality ...