Encryption with Statistical Self-Synchronization in Synchronous Broadband Networks

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1717)


Most of the data transmission networks used today are based on the technology of the Synchronous Digital Hierarchy (SDH) or Synchronous Optical Networks (SONET) respectively. However rarely, they support any security services for confidentiality, data integrity, authentication or any protection against unauthorized access to the transmitted information. It is the subscriber’s responsibility to apply security measures to the data before the information is passed on to the network. The use of encryption provides data confidentiality. This, however, requires consideration of the underlying network technology. The method described in this paper allows the use of encryption in broadband networks. The advantages of this method are the transparency of the encryption applied to the signal structure and signal format, and the automatic resynchronization after transmission errors. The used mode of operation, is called “statistical self-synchronization”, because the synchronization between encryption and decryption is initiated by the presence of a certain bit pattern in the ciphertext, which occurs statistically. An encryption device, designed for SDH/SONET-networks with transmission rates of 622 Mbit/s, is to be presented.


Broadband Networks SDH/SONET Confidentiality Cryptography Encryption Modes of Operation Self-Synchronization 


  1. 1.
    ATM Forum: ATM Security Specification, Version 1.0, Final Ballot. January 1999Google Scholar
  2. 2.
    CE Infosys: CE99C003B Technical Reference (Priliminary). 1997Google Scholar
  3. 3.
    ANSI X3.92: Data Encryption Algorithm Standard, 1981Google Scholar
  4. 4.
    ISO/ICE: ISO 10116, Modes of Operation for an n-bit block cipher algorithm, Revision 1997Google Scholar
  5. 5.
    ITU-T Recommendation G.707: Network node interface for the synchronous digital hierarchy (SDH), 3/96Google Scholar
  6. 6.
    Schneier, Bruce: Applied Cryptography, 2nd Edition, John Wiley & Sons, 1996Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1999

Authors and Affiliations

  1. 1.University of Siegen, Institute for Data Communications SystemsSiegenGermany

Personalised recommendations