The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.04 - July-Aug. (2011 vol.9)
pp: 60-63
Sean W. Smith , Dartmouth College
ABSTRACT
The author proposes a streamwise model for online encryption for slow legacy networks.
INDEX TERMS
Distributed computing, legacy networks, authentication, encryption
CITATION
Sean W. Smith, "Room at the Bottom: Authenticated Encryption on Slow Legacy Networks", IEEE Security & Privacy, vol.9, no. 4, pp. 60-63, July-Aug. 2011, doi:10.1109/MSP.2011.89
REFERENCES
1. P. Tsang and S. Smith, "YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems," Proc. IFIP TC 11 23rd Int'l Information Security Conf., Springer, 2008, pp. 445–459.
2. R. Solomakhin, P. Tsang, and S.W. Smith, "High Security with Lower Latency in Legacy SCADA," Proc. 4th Ann. IFIP Working Group 11.10 Int'l Conf. Critical Infrastructure Protection, Springer, 2010, pp. 63–80.
3. A. Wright, J. Kinast, and J. McCarty, "Low-Latency Cryptographic Protection for SCADA Communications," Proc. 2nd Int'l Conf. Applied Cryptography and Network Security, LNCS 3089, Springer, 2004, pp. 263–277.
4. J. Chappell, "Hallmark Cryptographic Serial Communication," 2010; www.oe.energy.gov/DocumentsandMediaHallmark_Cryptographic_Serial_Communication.pdf .
5. M. Bellare et al., "A Concrete Security Treatment of Symmetric Encryption," Proc. IEEE Symp. Foundations of Computer Science (FOCS 97), IEEE CS Press, 1997, pp. 394–403.
6. P. Rogaway, "Nonce-Based Symmetric Encryption," Proc. FSE, LNCS 3017, Springer, 2004, pp. 348–359.
7. M. Bellare, T. Kohno, and C. Namprempre, "Authenticated Encryption in SSH: Provably Fixing the SSH Binary Packet Protocol," Proc. ACM Conf. Computer and Communications Security, ACM Press, 2002, pp. 1–11.
8. A. Joux, G. Martinet, and F. Valette, "Blockwise-Adaptive Attackers: Revisiting the (In)Security of Some Provably Secure Encryption Models: CBC, GEM, IACBC," Crypto, LNCS 2442, Springer, 2002, pp. 17–30.
9. P. Tsang, R. Solomakhin, and S.W. Smith, Astro: Authenticated Streamwise On-line Encryption, tech. report TR2009-640, Computer Science Dept., Dartmouth College, Mar. 2009.
23 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool