This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Trust Requirements and Performance of a Fast Subtransport-Level Protocol for Secure Communication
February 1993 (vol. 19 no. 2)
pp. 181-186

A secure network protocol called the authenticated datagram protocol (ADP) that optimizes the performance of global networks by establishing host-to-host secure channels and building agent-to-agent channels on top of host-to-host channels is presented. The performance advantages of ADP come with an accompanying set of trust requirements that are stringent for a network spanning mutually distrustful organizations. The cause for this stringency is shown to be propagation of trust relationships in ADP. Methods of breaking their propagation and thereby accomplishing a significant reduction in ADP's trust requirements are presented. ADP, being a protocol for establishing host-to-host channels, can be handled at the subtransport level of the protocol hierarchy. A prototype of ADP implemented on Sun workstations connected by an Ethernet is described. Experimental measurements confirm that both the average latency of messages and the maximum throughput are substantially better than other secure protocols.

[1] D. P. Anderson, D. Ferrari, P. Venkat Rangan, and B. Sartirana, "A protocol for secure communication in large distributed systems," inProc. 7th Int. Conf. Distributed Computing Syst., Berlin, Sept. 21-25, 1987, pp. 473-480.
[2] A. D. Birrell, "Secure communication using remote procedure calls,"ACM Trans. Comput. Syst., vol. 3, no. 1, pp. 1-14, Feb. 1985.
[3] D. Branstadet al., "SP4: A transport encapsulation security protocol," inProc. 10th Nat. Comput. Security Conf., NBS/NCSC, Sept. 1987, pp. 158-161.
[4] D. E. Denning, "Digital signatures with RSA and other public-key cryptosystems,"Commun. Ass. Comput. Mach., vol. 27, no. 4, pp. 388-392, Apr. 1984.
[5] W. Diffie, "Conventional versus public key cryptosystems,"Secure Communications and Asymmetric Cryptosystems, G. J. Simmons, Ed. Boulder, CO: Westview Press, 1982.
[6] R. Kemmerer, "Analyzing encryption protocols using formal verification techniques,"IEEE J. Selected Areas Commun., vol. 7, no. 4, pp. 448-457, 1989.
[7] S. T. Kent, "Some thoughts on TCP and communication security,"Local Network Note, Lab. for Computer Sci., Massachusetts Institute of Technology, Cambridge, May 1977.

Index Terms:
trust requirements; performance; fast subtransport-level protocol; secure communication; authenticated datagram protocol; host-to-host secure channels; agent-to-agent channels; Sun workstations; Ethernet; average latency; maximum throughput; data integrity; protocols; security of data
Citation:
P.V. Rangan, "Trust Requirements and Performance of a Fast Subtransport-Level Protocol for Secure Communication," IEEE Transactions on Software Engineering, vol. 19, no. 2, pp. 181-186, Feb. 1993, doi:10.1109/32.214834
Usage of this product signifies your acceptance of the Terms of Use.