3 January 1996 ATM payload encryption and security-on-demand
Author Affiliations +
Abstract
Communications over wide area networks are becoming a commonly used form of commercial interaction. Internet Protocol (IP) transfer of data packets has facilitated world-wide connectivity of employees who use computers as a daily tool. There is rapidly growing interest in Asynchronous Transfer Mode (ATM) networking as a means of increasing service, while reducing cost-per-bit for transmission. ATM can simultaneously carry IP data packets along with other data forms such as voice and video. In the commercial world, which has become aware of the need for security on its data transmissions and is just beginning to acquire products individually for IP, or voice, or video data security, there now arises the potentially unifying transfer mechanism of ATM, and with it the prospect of a seemingly more unified ATM security process as well. As first applications of ATM security are emerging, we enter an era of complex requirements and issues that must be addressed if these security products are to be genuinely used. This paper will begin with a brief introduction to ATM encryption as a process. However, its primary focus will be upon the issues and technical challenges that face potential developers of ATM encryption products. This is useful because the type of encryption a designer selects and the details of its implementation are influenced by the threat to be addressed as well as the communication environment. These decisions will be influenced particularly heavily for ATM by the initial investment required to develop an encryptor. A summary of the state-of-the-art will be provided in conclusion.
© (1996) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Gary N. Cohen, Gary N. Cohen, } "ATM payload encryption and security-on-demand", Proc. SPIE 2615, Integration Issues in Large Commercial Media Delivery Systems, (3 January 1996); doi: 10.1117/12.229212; https://doi.org/10.1117/12.229212
PROCEEDINGS
8 PAGES


SHARE
RELATED CONTENT

Network systems security analysis
Proceedings of SPIE (May 14 2015)
Quality-of-service renegotiations
Proceedings of SPIE (December 16 1998)
Research in trust-based user cooperation model
Proceedings of SPIE (October 28 2011)
Implementation of virtual LANs over ATM WANs
Proceedings of SPIE (September 16 1998)
ATM encryption testing
Proceedings of SPIE (January 03 1996)
A new mechanism for constrained-based multicast
Proceedings of SPIE (September 28 2006)

Back to Top