LOKI—a cryptographic primitive for authentication and secrecy applications
AUSCRYPT '90 Proceedings of the international conference on cryptology on Advances in cryptology
A proposal for a new block encryption standard
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Linear cryptanalysis method for DES cipher
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
On the security of multiple encryption
Communications of the ACM
Cryptography: Theory and Practice
Cryptography: Theory and Practice
Differential Cryptanalysis of DES-like Cryptosystems
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm
Fast Software Encryption, Cambridge Security Workshop
A New Approach to Block Cipher Design
Fast Software Encryption, Cambridge Security Workshop
Hi-index | 0.00 |
Broadband networks based on the asynchronous transfer mode (ATM) are emerging rapidly. Both the technological component in terms of ATM infrastructure, as well as the area of applications requiring Quality of Services (QoS) by the means of bandwidth or delay constraints is covered by a variety of projects and products. However, given the increasing interest in applications such as governmental communication, transmission of medical information, or commercial applications, the necessity of providing secure means of delivering sensitive contents is apparent. In this paper, we focus on security services in ATM network. Data security plays an increasingly important role in today's information technology. Potential data rates in the gigabit ranges such as offered by ATM networks, put many constraints on the design of a secure, but usable, network. In addition, the cell structure of ATM makes bulk data encryption as well as public key security services challenging tasks. This paper deals with agility of cryptographic algorithms that is the capability of an encryption device to change its algorithm. This feature appears to be very desirable for high speed networks because it facilitates design flexibility and future protocol additions and changes. We propose the use of reconfigurable hardware since they appear to be naturally suited for the task. The use of reconfigurable in cryptographic applications to our knowledge has not been systematically analyzed before and appears to be a highly interesting area within high speed network security.