DocumentCode
3234199
Title
Network Interoperability Program
Author
Moore, D. Aretha
Author_Institution
Nat. Space Agency, Fort Meade, MD, USA
Volume
3
fYear
1997
fDate
2-5 Nov 1997
Firstpage
1152
Abstract
The increased use of the evolving commercial infrastructure places special constraints on the development of security products. The Interoperability Program is an umbrella effort to develop interoperability requirements for the family of encryption products providing the security of the network infrastructure. The initial output of this effort is the Interoperability Functional Requirements Criteria. The document was created to provide guidelines and requirements on classes of security products which will operate over the evolving commercial infrastructure. It was developed by a working group including representatives from DOD and commercial companies. Encryption classes were defined at the link, network and application layers. Based upon the expected evolution of the commercial architecture approaches were developed to both provide heterogeneity of equipment and extend transparency of needed security services across all layers. Important areas of inclusion in the specification are: (1) the establishment of the Internet Security Association and Key Management Protocol (ISAKMP) as the security management protocol, (2) definition of a transition from the Security Association Management Protocol (ISAMP) to ISAKMP, and (3) the establishment of an interpretable Domain of Interpretation (DOI). Along with this, common encryption data handling and voice algorithms were defined to insure a least common denominator mode with heterogeneity between equipment
Keywords
Internet; asynchronous transfer mode; cryptography; military communication; open systems; protocols; telecommunication networks; ATM network; DOD; ISAKMP; ISAMP; Internet Security Association and Key Management Protocol; Network Interoperability Program; Security Association Management Protocol; application layer; commercial infrastructure; domain of interpretation; encryption data handling algorithm; encryption products; link layer; network infrastructure security; network layer; security management protocol; security products; security services; voice algorithm; Asynchronous transfer mode; Communication system security; Cryptography; Data security; Guidelines; Information security; National security; Protection; Protocols; US Department of Defense;
fLanguage
English
Publisher
ieee
Conference_Titel
MILCOM 97 Proceedings
Conference_Location
Monterey, CA
Print_ISBN
0-7803-4249-6
Type
conf
DOI
10.1109/MILCOM.1997.644879
Filename
644879
Link To Document