scispace - formally typeset
Open Access

Security Architecture for the Internet Protocol

R. Atkinson
- Vol. 1825, pp 1-101
Reads0
Chats0
TLDR
This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer, and obsoletes RFC 2401 (November 1998).
Abstract
This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]

read more

Content maybe subject to copyright    Report

Citations
More filters
Patent

Hardware accelerated validating parser

TL;DR: In this article, a hardware accelerated validation parser is provided to remove a large portion if not all of the processing and overhead burden of validation parsing from a host processor by parallel access to both a state table and a data dictionary based on a token and merging and selective redirection of the respective outputs thereof.
Patent

Method and apparatus for electing a leader node in a computer network

TL;DR: In this paper, the first computer node for selecting a leader node to provide service to a plurality of other nodes in a multicast group, wherein each of the nodes communicates using multicast messages, comprises issuing a first election call message; receiving candidacy announcement messages from one or more leader candidate nodes, in a specified time period; selecting a victor from among all leader candidate node from which candidacy announcement message are received; receiving oneor more victor announcement message from leader victor nodes for a second specified time periods; resolving zero or more collisions among the victor announcements to result
Book ChapterDOI

Spying in the dark: TCP and tor traffic analysis

TL;DR: This work presents different attacks, utilizing different side-channels, for two scenarios: a fully off-path attack detecting TCP connections, and an attack detecting Tor connections by eavesdropping only on the clients.
Patent

Data transmission controlling method and data transmission system

TL;DR: In this article, a data transmission system permitting secure and reliable transmission of data from a data transmitter to a data receiver or receivers is described, which consists of a data transmitter for encrypting data and transmitting the encrypted data; data receivers for receiving the encrypted information from the data transmitter; and bidirectional communication channels which are also used for transmitting data from the receivers to the data transmitters and which have smaller capacity of data transmission than the satellite links.
Patent

Maintaining Mobile Terminal Information for Secure E-Mail Communications

TL;DR: In this paper, a service activation code that includes encryption information and an identifier from an authenticated user of the mobile terminal is received, and the encryption information may be provided to a connectivity function for use in establishing an encrypted data channel.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.

Key words for use in RFCs to Indicate Requirement Levels

S. Bradner
TL;DR: This document defines these words as they should be interpreted in IETF documents as well as providing guidelines for authors to incorporate this phrase near the beginning of their document.
Journal ArticleDOI

Using encryption for authentication in large networks of computers

TL;DR: Use of encryption to achieve authenticated communication in computer networks is discussed and example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee.

Internet Protocol, Version 6 (IPv6) Specification

S. Deering, +1 more
TL;DR: In this paper, the authors specify version 6 of the Internet Protocol (IPv6), also referred to as IP Next Generation or IPng, and propose a new protocol called IPng.

Internet Protocol

J. Postel
TL;DR: Along with TCP, IP represents the heart of the Internet protocols and has two primary responsibilities: providing connectionless, best-effort delivery of datagrams through an internetwork; and providing fragmentation and reassembly of data links to support data links with different maximum transmission unit (MTU) sizes.