Enterprise network security and extensions tpo Galois/Counter Mode encryption

被引:0
|
作者
DeCusatis, C
机构
关键词
enterprise; SAN; galois; GCNI; DES; AES;
D O I
10.1109/IAW.2005.1495948
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The need for improved security has been widely recognized in the information technology industry. However, the increased overhead associated with most data encryption schemes has not been fully quantified for either current generation enterprise servers or future systems. In this paper, we report on an enterprise storage area network testbed used to evaluate the performance impact of strong data encryption on data-in-flight, over distances typically associated with a disaster recovery network. Results suggest that this impact is minimal, paving the way for the implementation of hybrid encryption/authentication techniques in future networks. We review one such approach, the Galois/Counter Mode, including a summary of recent industry standardization efforts in this area.
引用
收藏
页码:166 / 171
页数:6
相关论文
共 50 条
  • [31] Network Security Design for Manufacturing Enterprise
    He, Jiangmin
    Yao, Rihuang
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MECHATRONICS, ROBOTICS AND AUTOMATION (ICMRA 2015), 2015, 15 : 1015 - 1020
  • [32] Enterprise Level Security: Insider Threat Counter-Claims
    Simpson, William R.
    Foltz, Kevin E.
    WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, WCECS 2017, VOL I, 2017, : 112 - 117
  • [33] The Missing Difference Problem, and Its Applications to Counter Mode Encryption
    Leurent, Gaetan
    Sibleyras, Ferdinand
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT II, 2018, 10821 : 745 - 770
  • [34] Introducing the counter mode of operation to Compressed Sensing based encryption
    Fay, Robin
    INFORMATION PROCESSING LETTERS, 2016, 116 (04) : 279 - 283
  • [35] Network security - Hardware encryption for fast VPNs
    不详
    IEEE INTERNET COMPUTING, 1999, 3 (01) : 17 - 17
  • [36] Research on Computer Network Security and Encryption Technology
    Wang, Yanjun
    PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS, ENVIRONMENT, BIOTECHNOLOGY AND COMPUTER (MMEBC), 2016, 88 : 111 - 114
  • [37] Authenticated encryption mode for beyond the birthday bound security
    Iwata, Tetsu
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2008, 2008, 5023 : 125 - +
  • [38] Security in Voip Network Using Neural Network and Encryption Techniques
    Galande, Ashwini
    Londhe, Dattatraya
    Balpande, Mangesh
    INFORMATION AND NETWORK TECHNOLOGY, 2011, 4 : 223 - 227
  • [39] VPN Enterprise Network Construction Based on Security
    Zhou, Jinyi
    PROCEEDINGS OF THE 2016 5TH INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS AND COMPUTER SCIENCE, 2016, 80 : 704 - 707
  • [40] Towards Policy Unification for Enterprise Network Security
    Yakasai, Sadiq T.
    Zheng, Fu-Chun
    Guy, Chris G.
    2017 IEEE CONFERENCE ON NETWORK SOFTWARIZATION (IEEE NETSOFT), 2017,