Construction of a simple local area network encapsulation security protocol is discussed. The paper illustrates the way that the key distribution scheme, the confidentiality algorithm, and the integrity algorithm drive the protocol construction. A Needham/Schroeder based key distribution scheme, DES Cipher Block Chaining, and the Message Authentication Code are used as building blocks for a sample protocol. The sample protocol provides data origin authentication, confidentiality, and integrity.
CITATION STYLE
Housley, R. (1989). Encapsulation security protocol design for local area networks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 396 LNCS, pp. 103–109). Springer Verlag. https://doi.org/10.1007/3-540-51754-5_34
Mendeley helps you to discover research relevant for your work.