Journal ArticleDOI
Proposal on a secure communications service element (SCSE) in the OSI application layer
Reads0
Chats0
TLDR
The secure communication service element (SCSE) is proposed in the OSI application layer as a new type of common application service element to provide the security services of peer-entity authentication, data confidentiality, and data integrity.Abstract:
Under the increasing demand for secure communications, the existing security techniques cannot fulfil the requirements for security satisfactorily. A number of study items are identified in this area; however, one of the major targets is to realize security services in the open systems interconnection (OSI) communication environment. In response to this need, the secure communication service element (SCSE) is proposed in the OSI application layer as a new type of common application service element to provide the security services of peer-entity authentication, data confidentiality, and data integrity. As for the peer-entity authentication service, the overall authentication protocol between the peer SCSEs is proposed by using the underlying association control service element authentication procedure. Regarding the data integrity and confidentiality, the SCSE transfer service is introduced to cover all the requirements for these services to the extent of the selective field services and the recovery for integrity errors. >read more
Citations
More filters
Patent
Deterministic user authentication service for communication network
TL;DR: A user authentication service for a communication network authenticates local users before granting them access to personalized sets of network resources as discussed by the authors, where authentication agents on intelligent edge devices present users of associated end systems with log-in challenges.
Patent
Process for verifying the preservation of the integrity of an unprotected request sent by a client to a server by verifying the integrity of the response
TL;DR: In this article, a process for verifying the preservation of the integrity of an unprotected request sent by an anonymous client to a server, in which only one public key, that of the server, is used.
Journal ArticleDOI
Security considerations in a network management environment
TL;DR: Considers the security aspects of communication between two management processes operating in different management domains, and identifies two major risks: the security of information exchanged during the management association, and control of access to the management information base (MIB).
Patent
Client server verification and conservation of integrity of request
TL;DR: In this article, the integrity verification and conservation method involves using a flag emitted by the client with its request, and also a unique number sent by a client to indicate whether the server should or should not offer a guarantee of non-repetition of received requests.
Journal Article
Implementation and Evaluation of SCSE for OSI Secure Communications
TL;DR: It is shown that the efficient OSI security communication system can be realized by SCSE and the proposed approach can be applied to the totally duplicate and the semiduplicate communications, which means that the method is applicable to all OSI communication applications.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI
A method for obtaining digital signatures and public-key cryptosystems
TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI
Using encryption for authentication in large networks of computers
TL;DR: Use of encryption to achieve authenticated communication in computer networks is discussed and example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee.
Journal ArticleDOI
Timestamps in key distribution protocols
TL;DR: It is shown that key distribution protocols with timestamps prevent replays of compromised keys and have the additional benefit of replacing a two-step handshake.
On Digital Signatures and Public-Key Cryptosystems.
TL;DR: It is shown that the single operation of raising a number to a fixed power modulo a composite modulus is sufficient to implement digital signatures: a way of creating for a (digitized) document a recognizable, unforgeable, document-dependent digitized signature whose authenticity the signer can not later deny.