Security Communications Interoperability Protocol Implementation

被引:0
|
作者
Ionescu, Valeriu [2 ]
Sima, Ion [1 ]
Diaconu, Adrian-Viorel [1 ,3 ]
Stan, Valentin [3 ]
机构
[1] LUMINA Univ SE Europe, IT&C Dept, Bucharest, Romania
[2] Univ Pitesti, Fac Elect Commun & Comp Sci, Pitesti, Romania
[3] Univ Politehn Bucuresti, ETTI Dept, Bucharest, Romania
关键词
SCIP; AES; SHA; MELP; OpenSSL;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Security Communications Interoperability Protocol (SCIP) is used to secure communications at military grade and is based on complex cryptographic operations. While many implementations exist, their structure was not made public because of the classified nature of the specifications. In recent years many aspects regarding the SCIP protocol have become publically available, making possible the presentation of partial or full implementations. The following paper describes a SCIP implementation that uses both hardware and software components in order to reduce development cost and increase design flexibility while respecting the algorithm timing constraints.
引用
收藏
页码:327 / 330
页数:4
相关论文
共 50 条
  • [1] A Security Analysis Method of Security Protocol Implementation Based on Unpurified Security Protocol Trace a nd Security Protocol Implementation Ontology
    He, Xudong
    Liu, Jiabing
    Huang, Chin-Tser
    Wang, Dejun
    Meng, Bo
    IEEE ACCESS, 2019, 7 : 131050 - 131067
  • [2] Implementation of Security Services for Vehicular Communications
    Duarte, Daniel
    Silva, Luis
    Fernandes, Bruno
    Alam, Muhammad
    Ferreira, Joaquim
    FUTURE INTELLIGENT VEHICULAR TECHNOLOGIES, FUTURE 5V 2016, 2017, 185 : 79 - 90
  • [3] Trust Based Interoperability Security Protocol for Grid and Cloud Computing
    Rajagopal, R.
    Chitra, M.
    2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,
  • [4] A Scalable and distributed security protocol for multicast communications
    Saroit, Imane Aly
    El-Zoghdy, Said Fathy
    Matar, Mostafa
    International Journal of Network Security, 2011, 12 (02) : 61 - 74
  • [5] Virtual Laboratory of a Spider Crane: an implementation based on an interoperability protocol
    Chacon, Jesus
    Farias, Gonzalo
    Vargas, Hector
    Dormido, Sebastian
    2016 IEEE CONFERENCE ON CONTROL APPLICATIONS (CCA), 2016,
  • [6] Analysis and Implementation of Security Algorithms for Wireless Communications
    Ali, Abdinasir Hassan
    Masrom, Maslin
    2010 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2010), VOL 2, 2010, : 430 - 434
  • [7] INTEROPERABILITY IN DEFENSE COMMUNICATIONS
    LAVEAN, GE
    IEEE TRANSACTIONS ON COMMUNICATIONS, 1980, 28 (09) : 1445 - 1455
  • [8] An RBAC implementation and interoperability standard - The INCITS cyber security 1.1 model
    Coyne, Ed
    Weil, Tim
    IEEE SECURITY & PRIVACY, 2008, 6 (01) : 84 - 87
  • [9] Light weight security protocol for communications in vehicular networks
    Kolla Raja Sekhar
    T. S. Ravi Chandra
    Salecha Pooja
    S. Tapaswi
    Wireless Networks, 2016, 22 : 1343 - 1353
  • [10] Light weight security protocol for communications in vehicular networks
    Sekhar, Kolla Raja
    Chandra, T. S. Ravi
    Pooja, Salecha
    Tapaswi, S.
    WIRELESS NETWORKS, 2016, 22 (04) : 1343 - 1353