Back to Results
First PageMeta Content
Block cipher modes of operation / Automated teller machine / Cryptography / Science / TACLANE / Technology / Computing / Asynchronous Transfer Mode


Practical Experiences with ATM Encryption Gregory T. Byrd NC State University Raleigh, NC Nathan Hillery
Add to Reading List

Document Date: 2001-07-20 00:14:41


Open Document

File Size: 81,53 KB

Share Result on Facebook

Company

C. John Wiley and Sons Inc. / CRC Press / Shimizu / /

Facility

FIPS PUB / ATM Encryption Gregory T. Byrd NC State University / /

IndustryTerm

broadband communications applications / actual networks / software portion / telepresence applications / application-specific networks / public carrier networks / exchange protocol / unidirectional protocol / Symmetric-key algorithms / bank bit / encryption hardware / switch software / key banks / secure private network / symmetric-key algorithm / encryption chips / alternate key bank / alternate hardware key bank / cryptographic unit software / public-key protocol / experimental encryption chips / packet networks / update protocol / test network / software processing / public network / higher speed encryption devices / private network / bank identifier / end-user equipment / high-speed wide area communications / encryption device / packet encryption devices / bank / unused bank / binary search / in-band network management / security services / deployed network technology / public-key algorithm / authentication algorithms / network management / public networks / threeexchange protocol / publickey algorithm / time-insensitive applications / flow-through device / public and private networks / unused key bank / unsecure public network / /

Organization

ATM Encryption Gregory T. Byrd NC State University Raleigh / US Department of Commerce / American Bankers Association / European Central Bank / U.S. Securities and Exchange Commission / National Bureau of Standards / SKC OAM / /

Person

Jim Symon Cylink Morrisville / Nathan Hillery Cylink Morrisville / LAN CU / Gregory T. Byrd / /

Position

Private Network Random Number Generator / designer / /

PublishedMedium

IEEE Transactions on Information Theory / /

Technology

public-key algorithm / LAN / ATM Forum Counter Mode Encryption / broadband / authentication algorithms / RSA public-key algorithm / 3.1 Counter-Mode Encryption / packet encryption / key exchange protocol / 1 The protocol / deploying ATM encryption / block cipher / 3.3 Key Exchange Protocol / two-pass protocol / ATM / Symmetric-key algorithms / secret key / Data Encipherment Algorithm / Quality of Service / WAN / Integrated Circuits / pdf / access control list / software hardware ATM Receive Interface Pre-encrypt Extract FIFO Pre-encrypt Insert FIFO Post-encrypt Extract FIFO Encryption / encryption / experimental encryption chips / counter-mode encryption / cell encryption / Cryptography / public-key protocol / publickey algorithm / exchange protocol / encryption chips / three-key DES encryption / ATM-layer encryption / CellCase protocol / three-exchange protocol / encryption system / two key exchange protocols / Counter mode encryption / high-throughput encryption / two-exchange protocol / 1-Gbit/second GaAs DES chip / gigabit / deployed network technology / Digital signature / key update protocol / symmetric-key algorithm / 5 Conclusion Encryption / public-key-based protocol / normal ATM signaling protocols / ATM Encryption / stream cipher / threeexchange protocol / encrypted using a symmetric-key algorithm / /

SocialTag