Security Communications Interoperability Protocol Implementation

被引:0
|
作者
Ionescu, Valeriu [2 ]
Sima, Ion [1 ]
Diaconu, Adrian-Viorel [1 ,3 ]
Stan, Valentin [3 ]
机构
[1] LUMINA Univ SE Europe, IT&C Dept, Bucharest, Romania
[2] Univ Pitesti, Fac Elect Commun & Comp Sci, Pitesti, Romania
[3] Univ Politehn Bucuresti, ETTI Dept, Bucharest, Romania
关键词
SCIP; AES; SHA; MELP; OpenSSL;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Security Communications Interoperability Protocol (SCIP) is used to secure communications at military grade and is based on complex cryptographic operations. While many implementations exist, their structure was not made public because of the classified nature of the specifications. In recent years many aspects regarding the SCIP protocol have become publically available, making possible the presentation of partial or full implementations. The following paper describes a SCIP implementation that uses both hardware and software components in order to reduce development cost and increase design flexibility while respecting the algorithm timing constraints.
引用
收藏
页码:327 / 330
页数:4
相关论文
共 50 条
  • [31] Improvement of Security Protocol for Machine Type Communications in LTE-Advanced
    Choi, Hyoung-Kee
    Han, Chan-Kyu
    Choi, Dae-Sung
    2015 INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2015, : 1301 - 1306
  • [32] STUDY AND ANALYSIS OF THE INTERNET PROTOCOL SECURITY AND ITS IMPACT ON INTERACTIVE COMMUNICATIONS
    Khan, Arshi
    Ansari, Seema
    ADVANCES TECHNIQUES IN COMPUTING SCIENCES AND SOFTWARE ENGINEERING, 2010, : 239 - 243
  • [33] A Security Protocol for Vehicle Platoon Verification Using Optical Camera Communications
    Plattner, Michael
    Sonnleitner, Erik
    Ostermayer, Gerald
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, 25 (10) : 14698 - 14709
  • [34] On the Security of a Unique Batch Authentication Protocol for Vehicle-to-Grid Communications
    Tseng, Huei-Ru
    2012 12TH INTERNATIONAL CONFERENCE ON ITS TELECOMMUNICATIONS (ITST-2012), 2012, : 274 - 277
  • [35] Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications
    Dojen, Reiner
    Pasca, Vladimir
    Coffey, Tom
    SECURITY AND PRIVACY IN MOBILE INFORMATION AND COMMUNICATION SYSTEMS, 2009, 17 : 278 - 287
  • [36] Ensuring OPC interoperability, security
    Robbins, Renee
    CONTROL ENGINEERING, 2008, 55 (03) : 18 - 18
  • [37] Military communications and information systems interoperability
    Amanowicz, M
    Gajewski, P
    MILCOM 96, CONFERENCE PROCEEDINGS, VOLS 1-3, 1996, : 280 - 283
  • [38] Interoperability for Communications Based Train Control
    Thurston, David F.
    PROCEEDINGS OF THE ASME JOINT RAIL CONFERENCE, 2018, 2018,
  • [39] Data Security and Interoperability in Telecardiology
    Brandner, R.
    Idris, T.
    AKTUELLE KARDIOLOGIE, 2015, 4 (04) : 248 - 252
  • [40] THE FUTURE OF MOBILE COMMUNICATIONS - INTEROPERABILITY AND OR CONVERGENCE
    BURSZTEIN, J
    ELECTRICAL COMMUNICATION, 1994, (03): : 268 - 274