IBM Research Advances Security Technology

New algorithm first to perform encryption and authentication simultaneously in half the time

Select a topic or year

YORKTOWN HEIGHTS, N.Y - 30 Nov 2000: -- IBM Research has developed a new algorithm that simultaneously encrypts and authenticates information -- an important step to faster and more efficient security for e-business.

Previous approaches to ensuring secure communications required performing encryption and authentication in separate steps. The new algorithm, invented by IBM researcher Charanjit Jutla, accomplishes the same tasks as the previous techniques in about half the time. Equally important, the new algorithm can be even more effective on highly-parallel systems. Previous schemes couldn't take full advantage of the parallel processing capabilities offered by modern hardware. IBM Research estimates that a parallel hardware implementation of this new scheme could achieve speeds of terabits per second of authenticated encryption. This innovation could deliver higher performance encryption and authentication capabilities to the full range of systems, from servers to mobile devices.

"Soon more than one million businesses and one billion people will be connected by perhaps a trillion mobile and embedded devices, making fast, efficient security more critical than ever," said Charles Palmer, manager, Network Security and Cryptography at IBM Research. "Encryption and authentication will continue to be the core building blocks for securing Internet communication and computer systems. By combining the two steps, this security algorithm will help accelerate e-business processes throughout the industry."

IBM expects the new algorithm to be widely used for securing Internet protocols, storage area network protocols, fiber optic networks and several e-business applications. The new algorithm has the same provable security level as previous well-known techniques for performing encryption and authentication.IBM has also proposed to the National Institute of Standards (NIST) that the algorithm be used as a standard way of securing communications. Standardization by NIST would be a first step for widespread use of the algorithm in commercial settings.

IBM Research, with almost 3,000 researchers worldwide, operates facilities in eight locations around the globe, including Yorktown Heights, N.Y., San Jose, Calif., Ruschlikon, Switzerland, Yamato, Japan, Haifa, Israel. Beijing, China, Austin, Texas and Delhi, India. Major areas of research include computer systems, computer applications and solutions, systems technology, physical sciences, mathematical sciences, storage and communications. More details about the technological achievements of IBM Research scientists can be found at:

# # #

Related XML feeds
Topics XML feeds
Chemistry, computer science, electrical engineering, materials and mathematical sciences, physics and services science