Professional Documents
Culture Documents
Abstract
Already today, ATM-networks are not only used in backbone configurations of corporate networks, but also to connect Local Area Networks (LANs). Personal computers and workstations
can be equipped with ATM interfaces, as well as other devices that require high transmission
rates, i.e. video cameras. ATM encryption devices are required in order to guarantee data confidentiality during transmission. The ATM Forum has defined Security Specifications for this.
This contribution presents the ATM encryption technology, the difficulty with synchronization,
as well as its realizability. The described implementation uses SDWSONET connections with
155 Mbit/s as network interfaces, VLSI components for the encryption algorithm, and FPGA
modules for the management and control of the ATM encryption.
1 Introduction
ATM networks (Asynchronous Transfer Mode) will largely be used on all kinds of network configurations because this technology has a scalable bandwidth and uses various AAL, classes (ATM
Adaption Layer) which guarantee different qualities of services. The ATM technology is not limited
to wire-dependant communication networks, but is also used in Wireless ATM networks.
With respect to confidentiality and trustworthiness of the transmitted information, ATM networks
are neither more secure nor less secure than other network technologies. In order to guarantee a secure transmission, additional measures have to be taken. One possibility is the use of specific ATM
encryption devices. Depending on the positioning of such encryption devices within the network,
they can guarantee confidentiality for the transmission via different network domains: Individual
end-to-end ATM connections can be as much secured as all other connections within an ATM network, or an ATM subnetwork.
The security services and security mechanisms for ATM networks are described in the Security
Speczjications [ATM99] of the ATM Forum. In this presentation we will focus on ATM specific
encryption techniques because the security protocols which are used for authentication, key management, etc. mostly correspond to standard solutions. Particular importance lies herewith on the
synchronization protocol which maintains the synchronization of the decryption process under consideration of the cell loss rate that is allowed within ATM networks.
3 0 7
The mode of operation is based on the principle that not the actual clear text which in this case is
the payload of an ATM cell will be encrypted but rather a so-called State Vector of 64 Bits. The
cipher text is then created through XOR-operation of the cleartext which is a 64 Bit segment of the
payload with the encrypted State Vector. In order to be able to correctly decrypt the cipher text
again, both sides have to use the same 64 Bit State Vector. This 64 Bit State Vector consists of different counters, indicators and the content of a linear shift register and is modified in dependancy of
each 64 Bit segment of each ATM cell to be encrypted. It is guaranteed that each State Vector is
used only one single time.
(Re-) synchronization cells are added in defined cell periods into the ATM cell stream in order to
ensure the synchronism between the en- and the decryption side. These (re-) synchronization cells
include as a payload a new State Vector. The required re-synchronization rate is related to the
Quality of Service (QoS) parameters of the individual ATM connection. The (re-) synchronization
cells are separately generated for each virtual connection because the encryption process for each
virtual connection is done separately as well.
SDHlATM interface
SDHlATM interface
Overhead
308
The mode of operation is based on the principle that not the actual clear text which in this case is
the payload of an ATM cell will be encrypted but rather a so-called State Vector of 64 Bits. The
cipher text is then created through XOR-operation of the cleartext which is a 64 Bit segment of the
payload with the encrypted State Vector. In order to be able to correctly decrypt the cipher text
again, both sides have to use the same 64 Bit State Vector. This 64 Bit State Vector consists of different counters, indicators and the content of a linear shift register and is modified in dependancy of
each 64 Bit segment of each ATM cell to be encrypted. It is guaranteed that each State Vector is
used only one single time.
(Re-) synchronization cells are added in defined cell periods into the ATM cell stream in order to
ensure the synchronism between the en- and the decryption side. These (re-) synchronization cells
include as a payload a new State Vector. The required re-synchronization rate is related to the Quality of Service (QoS) parameters of the individual ATM connection. The (re-) synchronization cells
are separately generated for each virtual connection because the encryption process for each virtual
connection is done separately as well.
Decryption Side
SDHlATM interface
SDHlATM interface
Overhead
309
Connection-dependant Encryption
Unlike the link encryption, the encryption of the ATM cells of the presented device is done in
dependancy of the chosen virtual connection (VC). A different key can be used for each of these
connections. Furthermore, this encryption method offers the advantage that management cells
are recognized and therefore can be transmitted in clear text.
Modular Architecture
The crypto module is designed for a transmission rate of 155 Mbit/s, however can also be used
for even higher throughputs, i.e. 622 Mbit/s through the use of pipelining of the cryptographic
components and modification of the interfaces.
310
which show errors that cannot be corrected. A new checksum (Header Error Check) will be calculated for each sent ATM-cell and added to the cell header. The interface is able to process ATMcells of the UNI- (User Network Interface) as well as the NNI- (Network Node Zntetface) signalling.
Crypto Management
The main task of the crypto management includes functions for signalization of user-cells and
non-user-cells (i.e. OAM-cells), the calculation of the State Vectors, the management of the
cryptographic context as well as the key management. Furthermore, the module is responsible
for the generation and the evaluation of the (re-) synchronization cells.
rn
311
Literature
[ATM95]
[Am991
ATM Forum: ATM Security Specification. Version 1.0, Final Ballot. Januar 1999
[m971
[IS0971
[ITU361]
[ITU432]
Januar 1994
[SCH96]
3 1 2