Browse > Article
http://dx.doi.org/10.13089/JKIISC.2021.31.6.1237

ATM Cell Security Techniques Using OFB Mode on AES Block Cipher  

Im, Sung-Yeal (Pusan Nat'l University)
Abstract
This paper is about Asynchronous Transfer Mode (ATM) cell security in which an Output Feedback (OFB) mode is applied to an AES block ciphers. ATM cells are divided into user data cells and maintenance cells, and each cell is 53 octets in size and consists of a header of 5 octets and a payload of 48 octets. In order to encrypt/decrypt ATM cells, the boundaries of cells must be detected, which is possible using the Header Error Control (HEC) field in the header. After detecting the boundary of the cell, the type of payload is detected using a payload type (PT) code to encrypt only the user cell. In this paper, a security method for ATM cells that satisfies the requirements of ISO 9160 is presented.
Keywords
ATM cell; stream encipherment; OFB;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Denning, D. E., "Cryptography and Data Security," Addison-Wesley Publishing Co., pp. 138-139, 1983
2 Daemen, J., and Rijmen, V. "AES Proposal: Rijndael, Version 2," Submission to NIST, March 1999
3 Sin Hyeo-Bin, Yoo Hwang=Bin, "A Study on the Structure and Cryptographic Algorithm for Secrets in ATM-type High-Speed Communication Networks," JKICS, Vol 23, No. 1, May 1998
4 Im Sung-Yeal, Chung Ki-Dong,"ATM cell Encryption Method using Rijndael Algorithm in Physical Layer," KIPS, Vol 13-c, No.1, Feb., 2006
5 E. Biham, "New types of cryptanalytic attacks using related keys," Advances in Cryptology, Proceedings Eurocrypt'93, NCS 765, T. Helleseth, Ed., Springer-Verlag, pp. 398-409, 1993
6 NIST, "Announcing the Advanced Encryption Standard (AES)," FIPS PUB 197, 2001
7 Electronic Frontier Foundation," Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design," Sebastopol, CA: O'Reilly, 1998
8 Forouzan, B., "Security for Computer Networking," John Willy & sons, pp. 231-234, 2008
9 Rainer Handel, Manfred N.Huber and Stefan Schroder, "ATM Networks: Concepts, Protocols, Applications," Addison-Wesley Publishing Co., pp. 88-95, 1994
10 Handel,R."Operation and Maintenance Issues of ATM Networks," Proc. of the International Conference on Communication Technology, Beijing, 1992, Vol.1, pp1107~1117, 1992
11 Rainer Handel, Manfred N.Huber and Stefan Schroder, "ATM Networks: Concepts, Protocols, Applications," Addison-Wesley Publishing Co., pp. 88-95, 1994
12 ISO 9160 "Information processing-Data encipherment-Physical layer interoperability requirement," International Standards Organization, 1988
13 Rathgeb, E.P., Theimer, T.H., Huber, M.N. "ATM Switches - Basic Architectures and their Performance," International Journal of Digital and Analog Cabled System 3, vol.2, no.4, pp.227-236, Oct. 1989   DOI
14 ITU-T:recommendation I.432. 'B-ISDN User-Network Interface-Physical Layer Specification,' Rev. 1, Geneva, 1993
15 Suh Jeong-Wook, Kim Kyeong-Soo, "Information protection at ATM physical layer," JKIISC, Vol 7, No 1, Mar. 1997
16 Forouzan, B., "Security for Computer Networking," John Willy & sons, pp. 236-237, 2008
17 Newman, P.,"ATM Technology for Corporate Networks," IEEE Communications Magine, Vol.30, No.4, pp.90~101, Apr.,1992   DOI
18 Daemen, J., and Rijmen, V. "Rijndael: The Advanced Encryption Standard," Dr. Dobb's Journal, March 2001
19 Rathgeb, E.P., Theimer, T.H., Huber, M.N."ATM Switches - Basic Architectures and their Performance," International Journal of Digital and Analog Cabled System 3, vol.2, no.4, pp.227-236, October 1989   DOI
20 William Stallings, "Cryptography and Network Security:Principles and Practice," Pearson Education Inc., pp.187-189, 2014
21 Forouzan, B., "Security for Computer Networking," John Willy & sons, pp. 236-238, 2008
22 Forouzan, B., "Security for Computer Networking," John Willy & sons, pp. 236-237, 2008