Search Results

Advanced search parameters have been applied.
open access

Integrating end-to-end encryption and authentication technology into broadband networks

Description: BISDN services will involve the integration of high speed data, voice, and video functionality delivered via technology similar to Asynchronous Transfer Mode (ATM) switching and SONET optical transmission systems. Customers of BISDN services may need a variety of data authenticity and privacy assurances, via Asynchronous Transfer Mode (ATM) services Cryptographic methods can be used to assure authenticity and privacy, but are hard to scale for implementation at high speed. The incorporation of … more
Date: November 1, 1995
Creator: Pierson, L.G.
Partner: UNT Libraries Government Documents Department
open access

Scalable end-to-end ATM encryption test results

Description: Customers of Asynchronous Transfer Mode (ATM) services may need a variety of data authenticity and privacy assurances. Cryptographic methods can be used to assure authenticity and privacy, but are hard to scale for implementation at high speed. The incorporation of these methods into computer networks can severely impact functionality, reliability, and performance. To study these trade-offs, a prototype encryptor/decryptor was developed. This effort demonstrated the viability of implementing ce… more
Date: October 1, 1995
Creator: Pierson, L.G.
Partner: UNT Libraries Government Documents Department
open access

Key management for large scale end-to-end encryption

Description: Symmetric end-to-end encryption requires separate keys for each pair of communicating confidants. This is a problem of Order N{sup 2}. Other factors, such as multiple sessions per pair of confidants and multiple encryption points in the ISO Reference Model complicate key management by linear factors. Public-key encryption can reduce the number of keys managed to a linear problem which is good for scaleability of key management, but comes with complicating issues and performance penalties. Authe… more
Date: July 1, 1994
Creator: Witzke, E. L. & Pierson, L. G.
Partner: UNT Libraries Government Documents Department
open access

Performance modeling of network data services

Description: Networks at major computational organizations are becoming increasingly complex. The introduction of large massively parallel computers and supercomputers with gigabyte memories are requiring greater and greater bandwidth for network data transfers to widely dispersed clients. For networks to provide adequate data transfer services to high performance computers and remote users connected to them, the networking components must be optimized from a combination of internal and external performance… more
Date: January 1, 1997
Creator: Haynes, R.A. & Pierson, L.G.
Partner: UNT Libraries Government Documents Department
open access

Requirements for security signalling

Description: There has been some interest lately in the need for ``authenticated signalling``, and the development of signalling specifications by the ATM Forum that support this need. The purpose of this contribution is to show that if authenticated signalling is required, then supporting signalling facilities for directory services (i.e. key management) are also required. Furthermore, this contribution identifies other security related mechanisms that may also benefit from ATM-level signalling accommodati… more
Date: February 5, 1995
Creator: Pierson, L.G. & Tarman, T.D.
Partner: UNT Libraries Government Documents Department
open access

The role of decimated sequences in scaling encryption speeds through parallelism

Description: Encryption performance, in terms of bits per second encrypted, has not scaled well as network performance has increased. The authors felt that multiple encryption modules operating in parallel would be the cornerstone of scalable encryption. One major problem with parallelizing encryption is ensuring that each encryption module is getting the proper portion of the key sequence at the correct point in the encryption or decryption of the message. Many encryption schemes use linear recurring seque… more
Date: September 1, 1995
Creator: Witzke, E.L. & Pierson, L.G.
Partner: UNT Libraries Government Documents Department
open access

Final Report for the Scaled Asynchronous Transfer Mode (ATM) Encryption Laboratory Directed Research and Development Project

Description: This effort studied the integration of innovative methods of key management crypto synchronization, and key agility while scaling encryption speed. Viability of these methods for encryption of ATM cell payloads at the SONET OC- 192 data rate (10 Gb/s), and for operation at OC-48 rates (2.5 Gb/s) was shown. An SNL-Developed pipelined DES design was adapted for the encryption of ATM cells. A proof-of-principle prototype circuit board containing 11 Electronically Programmable Logic Devices (each h… more
Date: January 1, 1999
Creator: Pierson, L.G. & Witzke, E.L.
Partner: UNT Libraries Government Documents Department
open access

IP-Based Video Modem Extender Requirements

Description: Visualization is one of the keys to understanding large complex data sets such as those generated by the large computing resources purchased and developed by the Advanced Simulation and Computing program (aka ASCI). In order to be convenient to researchers, visualization data must be distributed to offices and large complex visualization theaters. Currently, local distribution of the visual data is accomplished by distance limited modems and RGB switches that simply do not scale to hundreds of … more
Date: December 16, 2003
Creator: Pierson, L G; Boorman, T M & Howe, R E
Partner: UNT Libraries Government Documents Department
open access

Final report for the protocol extensions for ATM Security Laboratory Directed Research and Development Project

Description: This is the summary report for the Protocol Extensions for Asynchronous Transfer Mode project, funded under Sandia`s Laboratory Directed Research and Development program. During this one-year effort, techniques were examined for integrating security enhancements within standard ATM protocols, and mechanisms were developed to validate these techniques and to provide a basic set of ATM security assurances. Based on our experience during this project, recommendations were presented to the ATM Foru… more
Date: March 1, 1996
Creator: Tarman, T.D.; Pierson, L.G. & Brenkosh, J.P.
Partner: UNT Libraries Government Documents Department
open access

Multiply-agile encryption in high speed communication networks

Description: Different applications have different security requirements for data privacy, data integrity, and authentication. Encryption is one technique that addresses these requirements. Encryption hardware, designed for use in high-speed communications networks, can satisfy a wide variety of security requirements if that hardware is key-agile, robustness-agile and algorithm-agile. Hence, multiply-agile encryption provides enhanced solutions to the secrecy, interoperability and quality of service issues … more
Date: May 1, 1997
Creator: Pierson, L.G. & Witzke, E.L.
Partner: UNT Libraries Government Documents Department
Back to Top of Screen