This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Room at the Bottom: Authenticated Encryption on Slow Legacy Networks
July-Aug. 2011 (vol. 9 no. 4)
pp. 60-63
Sean W. Smith, Dartmouth College
The author proposes a streamwise model for online encryption for slow legacy networks.

1. P. Tsang and S. Smith, "YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems," Proc. IFIP TC 11 23rd Int'l Information Security Conf., Springer, 2008, pp. 445–459.
2. R. Solomakhin, P. Tsang, and S.W. Smith, "High Security with Lower Latency in Legacy SCADA," Proc. 4th Ann. IFIP Working Group 11.10 Int'l Conf. Critical Infrastructure Protection, Springer, 2010, pp. 63–80.
3. A. Wright, J. Kinast, and J. McCarty, "Low-Latency Cryptographic Protection for SCADA Communications," Proc. 2nd Int'l Conf. Applied Cryptography and Network Security, LNCS 3089, Springer, 2004, pp. 263–277.
4. J. Chappell, "Hallmark Cryptographic Serial Communication," 2010; www.oe.energy.gov/DocumentsandMediaHallmark_Cryptographic_Serial_Communication.pdf .
5. M. Bellare et al., "A Concrete Security Treatment of Symmetric Encryption," Proc. IEEE Symp. Foundations of Computer Science (FOCS 97), IEEE CS Press, 1997, pp. 394–403.
6. P. Rogaway, "Nonce-Based Symmetric Encryption," Proc. FSE, LNCS 3017, Springer, 2004, pp. 348–359.
7. M. Bellare, T. Kohno, and C. Namprempre, "Authenticated Encryption in SSH: Provably Fixing the SSH Binary Packet Protocol," Proc. ACM Conf. Computer and Communications Security, ACM Press, 2002, pp. 1–11.
8. A. Joux, G. Martinet, and F. Valette, "Blockwise-Adaptive Attackers: Revisiting the (In)Security of Some Provably Secure Encryption Models: CBC, GEM, IACBC," Crypto, LNCS 2442, Springer, 2002, pp. 17–30.
9. P. Tsang, R. Solomakhin, and S.W. Smith, Astro: Authenticated Streamwise On-line Encryption, tech. report TR2009-640, Computer Science Dept., Dartmouth College, Mar. 2009.

Index Terms:
Distributed computing, legacy networks, authentication, encryption
Citation:
Sean W. Smith, "Room at the Bottom: Authenticated Encryption on Slow Legacy Networks," IEEE Security & Privacy, vol. 9, no. 4, pp. 60-63, July-Aug. 2011, doi:10.1109/MSP.2011.89
Usage of this product signifies your acceptance of the Terms of Use.