The Community for Technology Leaders
Green Image
As more users subscribe to ATM data services to support their broadband applications, ATM security devices must be employed to ensure protection against eavesdropping, impersonation, unauthorized data modification, and denial-of- service threats. Because security policies can vary according to site preference or import/export regulations, the ATM Forum's ATM Security Specification, Version 1.0, provides for the negotiation of security parameters. To increase the likelihood for successful negotiation of encryption parameters, the ATM encryptor must implement multiple algorithms. Such encryptors are called algorithm-agile encryptors. This article describes a prototype ATM encryptor that implements mechanisms for requesting an encryption algorithm, performing end-user and encryptor authentication, and exchanging encryption keys, using the ATM Forum's Security Message Exchange protocol. When used together, these mechanisms provide protection against eavesdropping and impersonation threats.
Lyndon G. Pierson, Thomas D. Tarman, Robert L. Hutchinson, Edward L. Witzke, Peter E. Sholander, "Algorithm-Agile Encryption in ATM Networks", Computer, vol. 31, no. , pp. 57-64, September 1998, doi:10.1109/2.708451
93 ms
(Ver 3.3 (11022016))