Insecurity in ATM-based passive optical networks

被引:0
作者
Thomas, S
Wagner, D
机构
来源
2002 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, CONFERENCE PROCEEDINGS | 2002年
关键词
APON; ATM; passive optical networks; churning; encryption; authentication; security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider the security of an ITU standard for ATM-based passive optical networks. First, we show that the standard's encryption algorithm, called churning, has an effective 8-bit key length and thus is trivial to break with exhaustive keysearch. Second, we show that the authentication mechanisms have significant weaknesses. The conclusion is that these measures should not be relied upon to provide security.
引用
收藏
页码:2803 / 2805
页数:3
相关论文
共 4 条
[1]  
GAINES HF, 1956, CRYPTOANALYSIS STUDY
[2]  
*ITU, 1998, G9831E ITU PON
[3]  
KIRBY R, 2000, NETWORK MAGAZIN 1105
[4]  
WILSON C, 2001, NET EC 0702