메뉴 건너뛰기




Volumn 4004 LNCS, Issue , 2006, Pages 12-29

Cryptography in theory and practice: The case of encryption in IPsec

Author keywords

Encryption; ESP; Integrity; IPsec

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER CRIME; COMPUTER SCIENCE; NETWORK PROTOCOLS; SECURITY OF DATA; STANDARDS;

EID: 33746067483     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11761679_2     Document Type: Conference Paper
Times cited : (33)

References (30)
  • 1
    • 0003315821 scopus 로고    scopus 로고
    • IP Encapsulating Security Payload (ESP)
    • August
    • R. Atkinson, "IP Encapsulating Security Payload (ESP)", RFC 1827, August 1995.
    • (1995) RFC , vol.1827
    • Atkinson, R.1
  • 2
    • 0003234495 scopus 로고
    • Requirements for IPv4 routers
    • June
    • F. Baker, "Requirements for IPv4 Routers", RFC 1812, June 1995.
    • (1995) RFC , vol.1812
    • Baker, F.1
  • 3
    • 3142623034 scopus 로고    scopus 로고
    • Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm
    • May
    • M. Bellare, T. Kohno and C. Namprempre, "Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm." ACM TISSEC, Vol. 7, No. 2, May 2004, pp. 206-241.
    • (2004) ACM TISSEC , vol.7 , Issue.2 , pp. 206-241
    • Bellare, M.1    Kohno, T.2    Namprempre, C.3
  • 4
    • 84937407719 scopus 로고    scopus 로고
    • Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm
    • T. Okamoto (ed.), LNCS, Springer-Verlag
    • M. Bellare and C. Namprempre, "Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm." In T. Okamoto (ed.), Advances in Cryptology - ASIACRYPT 2000, LNCS Vol. 1976, Springer-Verlag, 2000, pp. 531-545.
    • (2000) Advances in Cryptology - ASIACRYPT 2000 , vol.1976 , pp. 531-545
    • Bellare, M.1    Namprempre, C.2
  • 5
    • 84937429718 scopus 로고    scopus 로고
    • Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient cryptography
    • T. Okamoto (ed.), LNCS, Springer-Verlag
    • M. Bellare and P. Rogaway, "Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient cryptography." In T. Okamoto (ed.), Advances in Cryptology - ASIACRYPT 2000, LNCS Vol. 1976, Springer-Verlag, 2000, pp.317-330.
    • (2000) Advances in Cryptology - ASIACRYPT 2000 , vol.1976 , pp. 317-330
    • Bellare, M.1    Rogaway, P.2
  • 7
    • 0034777649 scopus 로고    scopus 로고
    • Intercepting mobile communications: The insecurity of 802.11
    • ACM Press
    • N. Borisov, I. Goldberg and D. Wagner, "Intercepting Mobile Communications: The Insecurity of 802.11", in Proc. MOBICOM 2001, ACM Press, 2001, pp. 180-189.
    • (2001) Proc. MOBICOM 2001 , pp. 180-189
    • Borisov, N.1    Goldberg, I.2    Wagner, D.3
  • 8
    • 35248836120 scopus 로고    scopus 로고
    • Password interception in a SSL/TLS channel
    • D. Boneh (ed.), LNCS, Springer-Verlag
    • B.Canvel, A.P. Hiltgen, S. Vaudenay and M. Vuagnoux, "Password Interception in a SSL/TLS Channel," in D. Boneh (ed.), Advances in Cryptology - CRYPTO 2003, LNCS Vol. 2729, Springer-Verlag, 2003, pp. 583-599
    • (2003) Advances in Cryptology - CRYPTO 2003 , vol.2729 , pp. 583-599
    • Canvel, B.1    Hiltgen, A.P.2    Vaudenay, S.3    Vuagnoux, M.4
  • 11
    • 33746050083 scopus 로고    scopus 로고
    • The AES-CBC cipher algorithm and its use with IPsec
    • Sept.
    • S. Frankel, R. Glenn and S. Kelly, "The AES-CBC Cipher Algorithm and Its Use with IPsec", RFC 3602, Sept. 2003.
    • (2003) RFC , vol.3602
    • Frankel, S.1    Glenn, R.2    Kelly, S.3
  • 13
    • 0003272021 scopus 로고    scopus 로고
    • The Internet Key Exchange (IKE)
    • Nov.
    • D. Harkins and D. Carrel, "The Internet Key Exchange (IKE)", RFC 2409, Nov. 1998.
    • (1998) RFC , vol.2409
    • Harkins, D.1    Carrel, D.2
  • 14
    • 84974720881 scopus 로고    scopus 로고
    • Unforgeable encryption and chosen ciphertext secure modes of operation
    • B. Schneier (ed.), LNCS, Springer-Verlag
    • J. Katz and M. Yung, "Unforgeable encryption and chosen ciphertext secure modes of operation," In B. Schneier (ed.), FSE 2000, LNCS Vol. 1978, Springer-Verlag 2001, pp. 284-299.
    • (2001) FSE 2000 , vol.1978 , pp. 284-299
    • Katz, J.1    Yung, M.2
  • 15
    • 0003068282 scopus 로고    scopus 로고
    • Security architecture for the Internet protocol
    • Nov.
    • S. Kent and R. Atkinson, "Security Architecture for the Internet Protocol", RFC 2401, Nov. 1998.
    • (1998) RFC , vol.2401
    • Kent, S.1    Atkinson, R.2
  • 16
    • 0003315821 scopus 로고    scopus 로고
    • IP Encapsulating Security Payload (ESP)
    • Nov.
    • S. Kent and R. Atkinson, "IP Encapsulating Security Payload (ESP)", RFC 2406, Nov. 1998.
    • (1998) RFC , vol.2406
    • Kent, S.1    Atkinson, R.2
  • 17
    • 33746084746 scopus 로고    scopus 로고
    • Security architecture for the Internet protocol
    • (obsoletes RFC 2401), Dec.
    • S. Kent and K. Seo, "Security Architecture for the Internet Protocol", RFC 4301 (obsoletes RFC 2401), Dec. 2005.
    • (2005) RFC , vol.4301
    • Kent, S.1    Seo, K.2
  • 18
    • 33746104718 scopus 로고    scopus 로고
    • IP Encapsulating Security Payload (ESP)
    • (obsoletes RFC 2406), Dec.
    • S. Kent, "IP Encapsulating Security Payload (ESP)", RFC 4303 (obsoletes RFC 2406), Dec. 2005.
    • (2005) RFC , vol.4303
    • Kent, S.1
  • 19
    • 84880901653 scopus 로고    scopus 로고
    • The order of encryption and authentication for protecting communications (or: How secure is SSL?)
    • J. Kilian (ed.), LNCS, Springer-Verlag
    • H. Krawczyk, "The Order of Encryption and Authentication for Protecting Communications (Or: How Secure Is SSL?)", in J. Kilian (ed.), Advances in Cryptology - CRYPTO 2001, LNCS Vol. 2139, Springer-Verlag 2001, pp. 310-331.
    • (2001) Advances in Cryptology - CRYPTO 2001 , vol.2139 , pp. 310-331
    • Krawczyk, H.1
  • 20
    • 33746062714 scopus 로고
    • Sept.
    • Internet Protocol, RFC 791, Sept. 1981.
    • (1981) RFC , vol.791
  • 21
    • 0009547332 scopus 로고    scopus 로고
    • The ESP DES-CBC cipher algorithm with explicit IV
    • Nov.
    • C. Madson and N. Doraswamy, "The ESP DES-CBC Cipher Algorithm With Explicit IV", RFC 2405, Nov. 1998.
    • (1998) RFC , vol.2405
    • Madson, C.1    Doraswamy, N.2
  • 22
    • 77954117749 scopus 로고    scopus 로고
    • Initialization vector attacks on the IPsec protocol suite
    • IEEE Computer Society
    • C.B. McCubbin, A.A. Selcuk and D. Sidhu, "Initialization vector attacks on the IPsec protocol suite." In WETICE 2000, IEEE Computer Society, pp. 171-175.
    • WETICE 2000 , pp. 171-175
    • McCubbin, C.B.1    Selcuk, A.A.2    Sidhu, D.3
  • 23
    • 35048881103 scopus 로고    scopus 로고
    • Can we trust cryptographic software? Cryptographic flaws in GNU Privacy Guard v1.2.3
    • C. Cachin (ed.), LNCS, Springer-Verlag
    • P.Q. Nguyen, "Can we trust cryptographic software? Cryptographic flaws in GNU Privacy Guard v1.2.3", in C. Cachin (ed.), Advances in Cryptology - EUROCRYPT 2004, LNCS Vol. 3027, Springer-Verlag 2004, pp. 555-570.
    • (2004) Advances in Cryptology - EUROCRYPT 2004 , vol.3027 , pp. 555-570
    • Nguyen, P.Q.1
  • 24
    • 84941166035 scopus 로고    scopus 로고
    • NISCC Vulnerability Advisory IPSEC - 004033, 9th May
    • NISCC Vulnerability Advisory IPSEC - 004033, 9th May 2005. Available from http://www.niscc.gov.uk/niscc/docs/al-20050509-00386.html?lang=en.
    • (2005)
  • 26
    • 4444351714 scopus 로고    scopus 로고
    • The ESP CBC-mode cipher algorithms
    • Nov.
    • R. Pereira and R. Adams, "The ESP CBC-Mode Cipher Algorithms", RFC 2451, Nov. 1998.
    • (1998) RFC , vol.2451
    • Pereira, R.1    Adams, R.2
  • 27
    • 0003232377 scopus 로고
    • Internet control message protocol
    • Sept.
    • J. Postel, "Internet Control Message Protocol", RFC 792, Sept. 1981.
    • (1981) RFC , vol.792
    • Postel, J.1
  • 28
    • 0026851843 scopus 로고
    • On message integrity in cryptographic protocols
    • May
    • S. Stubblebine and V. Gligor, "On Message Integrity in Cryptographic Protocols", in IEEE Security and Privacy, May 1992, pp. 85-104.
    • (1992) IEEE Security and Privacy , pp. 85-104
    • Stubblebine, S.1    Gligor, V.2
  • 29
    • 84947212539 scopus 로고    scopus 로고
    • Security flaws induced by CBC padding - Applications to SSL, IPSEC, WTLS
    • L.R. Knudsen (ed.), LNCS, Springer-Verlag
    • S. Vaudenay, "Security flaws induced by CBC padding - applications to SSL, IPSEC, WTLS...", in L.R. Knudsen (ed.), Advances in Cryptology - EUROCRYPT 2002, LNCS Vol. 2332, Springer-Verlag 2002, pp. 534-545.
    • (2002) Advances in Cryptology - EUROCRYPT 2002 , vol.2332 , pp. 534-545
    • Vaudenay, S.1
  • 30
    • 85073480054 scopus 로고    scopus 로고
    • The perils of unauthenticated encryption: Kerberos version 4
    • The Internet Society
    • T. Yu, S. Hartman and K. Raeburn, "The perils of unauthenticated encryption: Kerberos version 4", in Proc. NDSS 2004, The Internet Society, 2004.
    • (2004) Proc. NDSS 2004
    • Yu, T.1    Hartman, S.2    Raeburn, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.