This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Algorithm-Agile Encryption in ATM Networks
September 1998 (vol. 31 no. 9)
pp. 57-64
As more users subscribe to ATM data services to support their broadband applications, ATM security devices must be employed to ensure protection against eavesdropping, impersonation, unauthorized data modification, and denial-of- service threats. Because security policies can vary according to site preference or import/export regulations, the ATM Forum's ATM Security Specification, Version 1.0, provides for the negotiation of security parameters. To increase the likelihood for successful negotiation of encryption parameters, the ATM encryptor must implement multiple algorithms. Such encryptors are called algorithm-agile encryptors. This article describes a prototype ATM encryptor that implements mechanisms for requesting an encryption algorithm, performing end-user and encryptor authentication, and exchanging encryption keys, using the ATM Forum's Security Message Exchange protocol. When used together, these mechanisms provide protection against eavesdropping and impersonation threats.
Citation:
Thomas D. Tarman, Robert L. Hutchinson, Lyndon G. Pierson, Peter E. Sholander, Edward L. Witzke, "Algorithm-Agile Encryption in ATM Networks," Computer, vol. 31, no. 9, pp. 57-64, Sept. 1998, doi:10.1109/2.708451
Usage of this product signifies your acceptance of the Terms of Use.