Abstract
Most of the data transmission networks used today are based on the technology of the Synchronous Digital Hierarchy (SDH) or Synchronous Optical Networks (SONET) respectively. However rarely, they support any security services for confidentiality, data integrity, authentication or any protection against unauthorized access to the transmitted information. It is the subscriber’s responsibility to apply security measures to the data before the information is passed on to the network. The use of encryption provides data confidentiality. This, however, requires consideration of the underlying network technology. The method described in this paper allows the use of encryption in broadband networks. The advantages of this method are the transparency of the encryption applied to the signal structure and signal format, and the automatic resynchronization after transmission errors. The used mode of operation, is called “statistical self-synchronization”, because the synchronization between encryption and decryption is initiated by the presence of a certain bit pattern in the ciphertext, which occurs statistically. An encryption device, designed for SDH/SONET-networks with transmission rates of 622 Mbit/s, is to be presented.
Chapter PDF
Similar content being viewed by others
Keywords
References
ATM Forum: ATM Security Specification, Version 1.0, Final Ballot. January 1999
CE Infosys: CE99C003B Technical Reference (Priliminary). 1997
ANSI X3.92: Data Encryption Algorithm Standard, 1981
ISO/ICE: ISO 10116, Modes of Operation for an n-bit block cipher algorithm, Revision 1997
ITU-T Recommendation G.707: Network node interface for the synchronous digital hierarchy (SDH), 3/96
Schneier, Bruce: Applied Cryptography, 2nd Edition, John Wiley & Sons, 1996
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jung, O., Ruland, C. (1999). Encryption with Statistical Self-Synchronization in Synchronous Broadband Networks. In: Koç, Ç.K., Paar, C. (eds) Cryptographic Hardware and Embedded Systems. CHES 1999. Lecture Notes in Computer Science, vol 1717. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48059-5_29
Download citation
DOI: https://doi.org/10.1007/3-540-48059-5_29
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-66646-2
Online ISBN: 978-3-540-48059-4
eBook Packages: Springer Book Archive