Abstract
Analog and digital plain old telephony service (POTS) is increasingly replaced by technologies that integrate voice, data, and video communication services. The integrated services digital network (ISDN) offers the embedding of this advanced multimedia communication into the subscriber loop. Nowadays widely available, ISDN builds a promising approach to improve company’s, public authority’s, or individual’s telecommunication facilities. However, a secure means of transferring sensitive information in any publicly accessible communication infrastructure is a major concern. In particular, authenticated and confidential communication is of paramount importance.
In this paper, we describe the implementation of a paradigm where advanced security services are offered by the ISDN infrastructure as an additional service. The encryption model is based on transparently integrating the security devices into the ISDN network termination (NT). This makes the approach independent from both the terminal equipment (TE), and the service used, as well as independent from the ISDN switches and exchanges installed by the service provider. The paper discusses integration of the security device into the ISDN architecture, as well as the design of a data encryption standard (DES) TripleDES encryption unit being the buttress of the ISDN security solution. Comparisons to related work and products in the field are made and the relation of the project to the broadband pendant to ISDN—broadband-ISDN (B-ISDN)—is sketched.
Chapter PDF
Similar content being viewed by others
References
G.C. Kessler, ISDN, Second Edition, MacGraw-Hill, 1993.
P. Kahl, ISDN Implementation Strategies of the Deutsche Bundespost Telekom, IEEE Communications Magazine, v. 28, n. 4, 1990.
J.P. Temime, Numeris-ISDN in France, IEEE Communications Magazine, v. 30, n. 8, 1992.
R. Roy, ISDN applications at Tenneco Gas, IEEE Communications Magazine, v. 28, n. 4, 1990.
C.S. Thachenkary, Integrated services digital network (ISDN): six case study assessments of a commercial application, Computer Networks and ISDN Systems, North Holland, v. 25, n. 8, 1993.
J.D. Hunter, W.W. Ellington, ISDN: A Consumer Perspective, IEEE Communications Magazine, v. 30, n. 8, 1992.
W. Burr, Security in ISDN, NIST special publication 500–189, 1991.
ISEG, ISDN Security Architecture, ISDN Security Expert Group ISEG, North American ISDN User Group, NIUF 412–92, 1992.
SecurPacTM, IEM ISDN Encryption Module, Technical Specifications, Secure Network Solutions Ltd, 1999.
Biodata, Handbuch Babylon SO, Biodata GmbH., 1999.
ANSI, American National Standard for Data Encryption Algorithm (DEA), ANSI 3.92, American National Standards Institute, 1981.
ANSI, American National Standard for Information Systems-Data Encryption Algorithm-Modes of Operation, ANSI 3.106, American National Standards Inst., 1983.
W. Tuchman, Hellman Presents no Shortcut Solutions to DES, IEEE Spectrum, v. 17, n. 7, 1979.
D. Stevenson, N. Hillery, G. Byrd, Secure Communications in ATM Networks, Communications of the ACM, v. 38, n. 3, 1995.
ETSI, Telecommunication Security: Integrated Services Digital Network(ISDN); Confidentiality system for audiovisual services, European Telecommunication Standard ETS 300 840, 1998.
M. Peyravian, T. Tarman, Asynchronous Transfer Mode Security, IEEE Networks, v. 11, n. 3, 1997.
ATM Forum, ATM Security Specification, Version 1.0, ATM Forum Technical Committee, ATM-SEC-01. 010, 1999.
ITU-T, User network interface aspects, 1.400 series, 1.410 — I. 450 International Telecommunication Union, Telecommunication Standardisation Sector, 1984.
ITU-T, Digital Subscriber Signalling System No. 1 - Network Layer, Recommendations Q.930 — Q. 940, International Telecommunication Union, Telecommunication Standardisation Sector, 1993.
ITU-T, Signalling System No. 7, Recommendations Q.700 — Q. 766, International Telecommunication Union, Telecommunication Standardisation Sector, 1988.
W. Diffie, M. Hellman, New directions in cryptography, IEEE transactions on information theory, vol. 22, 1976.
H. Leitold, U. Payer, R. Posch, A Hardware Independent Encryption Model for ATM Devices, Proceedings of 14`h Annual Computer Security Applications Conference ( ACSAC ), Phoenix, 1998.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer Science+Business Media Dordrecht
About this chapter
Cite this chapter
Leitold, H., Posch, K.C., Posch, R. (1999). ISDN Security Services. In: Preneel, B. (eds) Secure Information Networks. IFIP — The International Federation for Information Processing, vol 23. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35568-9_2
Download citation
DOI: https://doi.org/10.1007/978-0-387-35568-9_2
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-6487-1
Online ISBN: 978-0-387-35568-9
eBook Packages: Springer Book Archive