scispace - formally typeset
Open Access

Security Architecture for the Internet Protocol

R. Atkinson
- Vol. 1825, pp 1-101
Reads0
Chats0
TLDR
This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer, and obsoletes RFC 2401 (November 1998).
Abstract
This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]

read more

Content maybe subject to copyright    Report

Citations
More filters
Patent

Systems and Methods for Secure Transaction Management and Electronic Rights Protection

TL;DR: In this article, the authors proposed a secure content distribution method for a configurable general-purpose electronic commercial transaction/distribution control system, which includes a process for encapsulating digital information in one or more digital containers, a process of encrypting at least a portion of digital information, a protocol for associating at least partially secure control information for managing interactions with encrypted digital information and/or digital container, and a process that delivering one or multiple digital containers to a digital information user.

RTP: A Transport Protocol for Real-Time Applications

TL;DR: RTP provides end-to-end network transport functions suitable for applications transmitting real-time data over multicast or unicast network services and is augmented by a control protocol (RTCP) to allow monitoring of the data delivery in a manner scalable to large multicast networks.
Book ChapterDOI

SIP: Session Initiation Protocol

TL;DR: Session Initiation Protocol (SIP) as discussed by the authors is an application layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants, such as Internet telephone calls, multimedia distribution, and multimedia conferences.
Book ChapterDOI

Keying Hash Functions for Message Authentication

TL;DR: Two new, simple, and practical constructions of message authentication schemes based on a cryptographic hash function, NMAC and HMAC, are proven to be secure as long as the underlying hash function has some reasonable cryptographic strengths.
Journal ArticleDOI

Promoting the use of end-to-end congestion control in the Internet

TL;DR: It is argued that router mechanisms are needed to identify and restrict the bandwidth of selected high-bandwidth best-effort flows in times of congestion, and several general approaches are discussed for identifying those flows suitable for bandwidth regulation.
References
More filters

HMAC-MD5 IP Authentication with Replay Prevention

M. Oehler, +1 more
TL;DR: This document describes a keyed-MD5 transform to be used in conjunction with the IP Authentication Header [RFC-1826] and an option is also specified to guard against replay attacks.

Security Protocols for version 2 of the Simple Network Management Protocol (SNMPv2)

TL;DR: It is the purpose of this document, Security Protocols for SNMPv2, to define one such authentication and one such privacy protocol.

U.S. Department of Defense Security Options for the Internet Protocol

S. Kent
TL;DR: This RFC specifies the U.S. Department of Defense Basic Security Option and the top-level description of the Extended Security Option for use with the Internet Protocol and obsoletes RFC 1038 "Revised IP Security Option", dated January 1988.

Report of IAB Workshop on Security in the Internet Architecture - February 8-10, 1994

TL;DR: This document is a report on an Internet architecture workshop, initiated by the IAB and held at USC Information Sciences Institute on February 8-10, 1994, focused on security issues in the Internet architecture.