Enterprise network security and extensions tpo Galois/Counter Mode encryption

被引:0
|
作者
DeCusatis, C
机构
关键词
enterprise; SAN; galois; GCNI; DES; AES;
D O I
10.1109/IAW.2005.1495948
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The need for improved security has been widely recognized in the information technology industry. However, the increased overhead associated with most data encryption schemes has not been fully quantified for either current generation enterprise servers or future systems. In this paper, we report on an enterprise storage area network testbed used to evaluate the performance impact of strong data encryption on data-in-flight, over distances typically associated with a disaster recovery network. Results suggest that this impact is minimal, paving the way for the implementation of hybrid encryption/authentication techniques in future networks. We review one such approach, the Galois/Counter Mode, including a summary of recent industry standardization efforts in this area.
引用
收藏
页码:166 / 171
页数:6
相关论文
共 50 条
  • [1] The security and performance of the Galois/counter mode (GCM) of operation
    McGrew, DA
    Viega, J
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2004, PROCEEDINGS, 2004, 3348 : 343 - 355
  • [2] Advanced Encryption Standard with Galois Counter Mode using Field Programmable Gate Array
    Ahmad, Nabihah
    Wei, Lim Mei
    Jabbar, M. Hairol
    1ST INTERNATIONAL CONFERENCE ON GREEN AND SUSTAINABLE COMPUTING (ICOGES) 2017, 2018, 1019
  • [3] Lightweight and flexible hardware implementation of authenticated encryption algorithm SIMON-Galois/Counter Mode
    Cheng, Xin
    Xu, Yixuan
    Wang, Kefan
    Zhang, Yongqiang
    Li, Bin
    Zhang, Zhang
    INTERNATIONAL JOURNAL OF CIRCUIT THEORY AND APPLICATIONS, 2023, 51 (12) : 5951 - 5961
  • [4] Galois Substitution Counter Mode (GSCM)
    El-Fotouh, Mohamed Abo
    Diepold, Klaus
    EDOCW: 2008 12TH ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS, 2008, : 264 - 271
  • [5] Subverting Counter Mode Encryption for Hidden Communication in High-Security Infrastructures
    Hartl, Alexander
    Fabini, Joachim
    Roschger, Christoph
    Eder-Neuhauser, Peter
    Petrovic, Marco
    Tobler, Roman
    Zseby, Tanja
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [6] Enterprise Level Security with Homomorphic Encryption
    Foltz, Kevin
    Simpson, William R.
    ICEIS: PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS - VOL 1, 2017, : 177 - 184
  • [7] AES-Galois Counter Mode Encryption/Decryption FPGA Core for Industrial and Residential Gigabit Ethernet Communications
    Lazaro, Jesus
    Astarloa, Armando
    Bidarte, Unai
    Jimenez, Jaime
    Zuloaga, Aitzol
    RECONFIGURABLE COMPUTING: ARCHITECTURES, TOOLS AND APPLICATIONS, 2009, 5453 : 312 - 317
  • [8] Counter mode encryption for FNBDT/MELP
    Sleezer, R
    Daniel, E
    Raymond, J
    Brewer, J
    Teague, K
    2002 45TH MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL III, CONFERENCE PROCEEDINGS, 2002, : 692 - 695
  • [9] Timing Filter for Counter Mode Encryption
    Ahmed, Naveed
    2013 2ND NATIONAL CONFERENCE ON INFORMATION ASSURANCE (NCIA), 2013, : 107 - 111
  • [10] Security and the enterprise network
    Banes, David
    International Journal of Network Management, 1995, 5 (04) : 198 - 206