This paper describes the end-to-end cryptosystem features of a commercially available broadband local area network. The principles of operation are described. The key distribution protocol is a session layer function which uses master keys and one or more key distribution centers. A stream cipher based on DES is used at the transport layer for encryption of data.
[Home] [Back to Bibliography]