Abstract
This article describes various efforts to address security in three areas of the Internet protocol suite: the Internet Protocol itself (IPsec), the domain between transport and application layer (the Secure Sockets Layer and the Transport Layer Security protocols) and security extensions for the HyperText Transfer Protocol (S-HTTP). For each area the current technology, relevant standardization activities and likely future developments are discussed. In addition, a brief introduction to the Internet standardization process is given.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Bellare, M.; Canetti, R.; Krawczyk, H.: “Keying Hash Functions for Message Authentication”, Proceedings of Crypto’96, Springer LNCS 1109 (1996), 1–15.
Bellovin, S.M.; “Security Problems in the TCP/IP Protocol Suite”, ACM Computer Communications Review, Vol. 19, No. 2, March 1989.
Dierks, T.; Allen, C.: “The TLS Protocol-Version 1.0”, Internet-Draft, November 1997.
Dobbertin, H.; Bosselaers, A.; Preneel, B.: “RIPEMD-160: A Strengthened Version of RIPEMD”, Fast Software Encryption, Springer LNCS 1039 (1996), 71–82.
NIST FIPS PUB 180-1: Secure Hash Standard, April 1995.
NIST FIPS PUB 186: Digital Signature Standard, May 1994.
NIST FIPS PUB 46-1: Data Encryption Standard, reaffirmed January 1988 (supersedes FIPS PUB 46, 1977).
Freier, A. O.; Karlton, P.; Kocher, P. C.: “The SSL 3.0 Protocol”, Internet-Draft, November 1996.
Fumy, W.: “Key Management Techniques“, this volume, 143–164.
ISO/IEC 10116: Modes of operation for an n-bit block cipher algorithm, 2nd ed. 1997.
ISO/IEC 11577: Network Layer Security Protocol, 1995.
Johnson, D. B.; Matyas, S. M.; Le, A.; Wilkins, J.: “Design of the Commercial Data Masking Facility Data Privacy Algorithm”, Proceedings 1st ACM Conference on Computer & Communications Security, November 1993, Fairfax, VA., 93–96.
Kent, S.; Atkinson, R.: “Security Architecture for the Internet Protocol”, Internet-Draft, February 1998.
Kent, S.; Atkinson, R.: “IP Authentication Header”, Internet-Draft, February 1998.
Kent, S.; Atkinson, R.: “IP Encapsulating Security Payload (ESP)”, Internet-Draft, February 1998.
Keromytis, A. D.; Provos, N.: “The Use of HMAC-RIPEMD-160-96 within ESP and AH“, Internet-Draft, February 1998.
Kaliski, B.; Robshaw, M.: “Message authentication with MD5”, CryptoBytes, vol. 1 no. 1, Spring 1995.
Kilian, J.; Rogaway, P.: “How to Protect DES Against Exhaustive Key Search”, Proceedings of Crypto’96, Springer LNCS 1109 (1996), 252–267.
Madson, C.; Doraswamy, N.: “The ESP DES-CBC Cipher Algorithm With Explicit IV”, Internet-Draft, February 1998.
Madson, C.; Glenn, R.: “The Use of HMAC-MD5-96 within ESP and AH”, Internet-Draft, February 1998.
Madson, C.; Glenn, R.: “The Use of HMAC-SHA-1-96 within ESP and AH”, Internet-Draft, February 1998.
Maughan, D.; Schertler, M.; Schneider, M.; Turner, J.: “Internet Security Association and Key Management Protocol (ISAKMP)”, Internet-Draft, July 1997.
Orman, H. K.: “The Oakley Key Determination Protocol”, Internet-Draft, May 1996.
RSA Laboratories: “PKCS #1: RSA Encryption Standard”, version 1.5, November 1993.
RSA Laboratories: “PKCS #7: RSA Cryptographic Message Syntax Standard”, version 1.5, November 1993.
Preneel, B.; van Oorschot, P.: “On the Security of two MAC Algorithms”, Proceedings of Eurocrypt’96, Springer LNCS 1070 (1996), 19–32.
Kent, S., “US DoD Security Options for the Internet Protocol”, RFC 1108 (H), November 1991.
Kaliski, B.: “The MD2 Message-Digest Algorithm”, RFC1319 (I), April 1992.
Rivest, R.: “The MD5 Message-Digest Algorithm”, RFC1321 (I), April 1992.
Galvin, J.; McCloghrie, K.: “Security Protocols for version 2 of the Simple Network Management Protocol (SNMPv2)”, RFC 1446 (PS), April 1993.
Kohl, J.; Neuman, B.: “The Kerberos Network Authentication Service (V5)”, RFC 1510 (PS), September 1993.
Atkinson, R.: “Security Architecture for the Internet Protocol”, RFC 1825 (PS), August 1995.
Atkinson, R.: “IP Authentication Header”, RFC 1826 (PS), August 1995.
Atkinson, R.: “IP Encapsulating Security Payload (ESP)”, RFC 1827 (PS), August 1995.
Metzger, P.; Simpson, W.: “IP Authentication using Keyed MD5”, RFC 1828 (PS), August 1995.
Karn, P., Metzger, P., Simpson, W.: “The ESP DES-CBC Transform”, RFC 1829 (PS), August 1995.
Karn, P.; Metzger, P.; Simpson, W.: “The ESP Triple DES Transform”, RFC 1851 (E), September 1995.
Deering, S.; Hinden, R.: “Internet Protocol version 6 (IPv6) Specification”, RFC 1883 (PS), December 1995.
Fielding, R.; Gettys, J.; Mogul, J.; Frystyk, H.; Berners-Lee, T.: “Hypertext Transfer Protocol-HTTP/1.1”, RFC 2068 (PS), January 1997.
Bossert, G.; Cooper, S.; Drummond, W.: “Considerations for Web Transaction Security”, RFC 2084 (I), January 1997.
Krawczyk, H., Bellare, M., Canetti, R.: “HMAC: Keyed-Hashing for Message Authentication”, RFC 2104 (I), February 1997.
Adams, C.: “The CAST-128 Encryption Algorithm”, RFC 2144 (I), May 1977.
Cheng, P.; Glenn, R.: “Test Cases for HMAC-MD5 and HMAC-SHA-1”, RFC 2202 (I), March 1997.
Rescorla, E.; Schiffman, A.: “The Secure HyperText Transfer Protocol”, Internet-Draft, July 1996.
Secure Data Network System: “Security Protocol 3-SP3”, Document SDN.301, Revision 1.5, 15 May 1989.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Fumy, W. (1998). Internet Security Protocols. In: State of the Art in Applied Cryptography. Lecture Notes in Computer Science, vol 1528. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49248-8_8
Download citation
DOI: https://doi.org/10.1007/3-540-49248-8_8
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65474-2
Online ISBN: 978-3-540-49248-1
eBook Packages: Springer Book Archive