Skip to main content

Encapsulation security protocol design for local area networks

  • Section II: Protocols
  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 396))

Abstract

Construction of a simple local area network encapsulation security protocol is discussed. The paper illustrates the way that the key distribution scheme, the confidentiality algorithm, and the integrity algorithm drive the protocol construction. A Needham/Schroeder based key distribution scheme, DES Cipher Block Chaining, and the Message Authentication Code are used as building blocks for a sample protocol. The sample protocol provides data origin authentication, confidentiality, and integrity.

This is a preview of subscription content, log in via an institution.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Xerox Corporation. Authentication Protocol. Xerox System Integration Standard. Stamford, Connecticut; May 1986;XNSS 098605.

    Google Scholar 

  2. Needham, R. A.; Schroeder, M. D. "Using Encryption for Authentication in Large Networks of Computers" Communications of the Association of Computing Machinery 21, 12; December 1978; pp. 995–999.

    Google Scholar 

  3. National Bureau of Standards. "The Data Encryption Standard." Federal Information Processing Standards Publication (FIPS PUB) 46; January 1977; National Technical Information Service, Springfield, Virginia.

    Google Scholar 

  4. National Bureau of Standards. "DES Modes of Operation." Federal Information Processing Standards Publication (FIPS PUB) 81; December 1980; National Technical Information Service, Springfield, Virginia.

    Google Scholar 

  5. National Bureau of Standards. "Guidelines for Implementing and Using the NBS Data Encryption Standard." Federal Information Processing Standards Publication (FIPS PUB) 74; April 1981; National Technical Information Service, Springfield, Virginia.

    Google Scholar 

  6. National Bureau of Standards. "Computer Data Authentication." Federal Information Processing Standards Publication (FIPS PUB) 113; May 1985; National Technical Information Service, Springfield, Virginia.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Thomas A. Berson Thomas Beth

Rights and permissions

Reprints and permissions

Copyright information

© 1989 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Housley, R. (1989). Encapsulation security protocol design for local area networks. In: Berson, T.A., Beth, T. (eds) Local Area Network Security. LANSEC 1989. Lecture Notes in Computer Science, vol 396. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-51754-5_34

Download citation

  • DOI: https://doi.org/10.1007/3-540-51754-5_34

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-51754-2

  • Online ISBN: 978-3-540-46802-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics