Cryptographic Algorithms

  • Adrian Perrig
  • Pawel Szalachowski
  • Raphael M. Reischuk
  • Laurent Chuat
Chapter
Part of the Information Security and Cryptography book series (ISC)

Abstract

In this chapter, we describe the algorithm agility property provided by SCION, and the cryptographic algorithms used in the SCION architecture. Algorithm selection was motivated by two main requirements, security and efficiency, and was based on standards related to cryptography, recommendations, best practices, and performance evaluations [95, 190, 221, 224].

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Adrian Perrig
    • 1
  • Pawel Szalachowski
    • 2
  • Raphael M. Reischuk
    • 3
  • Laurent Chuat
    • 4
  1. 1.Network Security Group, CAB F 85.1ETH ZürichZürichSwitzerland
  2. 2.Network Security Group, CAB F 85.2ETH ZürichZürichSwitzerland
  3. 3.Network Security Group, CAB F 83ETH ZürichZürichSwitzerland
  4. 4.Network Security Group, CAB F 86.1ETH ZürichZürichSwitzerland

Personalised recommendations