Check out the new USENIX Web site. next up previous
Next: About this document ... Up: Cryptography in OpenBSD: An Previous: Disclaimer

References

1
R. Atkinson.
IP Authentication Header.
RFC 1826, August 1995.

2
R. Atkinson.
IP Encapsulating Security Payload.
RFC 1827, August 1995.

3
R. Atkinson.
Security Architecture for the Internet Protocol.
RFC 1825, August 1995.

4
S. Bellovin.
Probable Plaintext Cryptanalysis of the IP Security Protocols.
In Proceedings of the Symposium on Network and Distributed System Security, pages 155-160, February 1997.

5
M. Blaze.
A Cryptographic File System for Unix.
In Proc. of the 1st ACM Conference on Computer and Communications Security, November 1993.

6
T. Dierks and C. Allen.
The TLS protocol version 1.0.
Request for Comments (Proposed Standard) 2246, Internet Engineering Task Force, January 1999.

7
W. Diffie and M.E. Hellman.
New Directions in Cryptography.
IEEE Transactions on Information Theory, IT-22(6):644-654, Nov 1976.

8
W. Diffie, P.C. van Oorschot, and M.J. Wiener.
Authentication and Authenticated Key Exchanges.
Designs, Codes and Cryptography, 2:107-125, 1992.

9
D. Eastlake, 3rd, and C. Kaufman.
Domain name system security extensions.
Request for Comments (Proposed Standard) 2065, Internet Engineering Task Force, January 1997.

10
N. Haller.
The S/KEY one-time password system.
Request for Comments (Informational) 1760, Internet Engineering Task Force, February 1995.

11
Neil M. Haller.
the s/key one-time password system.
In Proceedings of the ISOC Symposium on Network and Distributed System Security, 1994.

12
D. Harkins and D. Carrel.
The internet key exchange (IKE).
Request for Comments (Proposed Standard) 2409, Internet Engineering Task Force, November 1998.

13
P. Karn and W. Simpson.
Photuris: Session-key management protocol.
Request for Comments (Experimental) 2522, Internet Engineering Task Force, March 1999.

14
S. Kent and R. Atkinson.
IP authentication header.
Request for Comments (Proposed Standard) 2402, Internet Engineering Task Force, November 1998.

15
S. Kent and R. Atkinson.
IP encapsulating security payload (ESP).
Request for Comments (Proposed Standard) 2406, Internet Engineering Task Force, November 1998.

16
S. Kent and R. Atkinson.
Security architecture for the internet protocol.
Request for Comments (Proposed Standard) 2401, Internet Engineering Task Force, November 1998.

17
A. Keromytis and N. Provos.
The use of HMAC-RIPEMD-160-96 within ESP and AH.
Internet Draft, Internet Engineering Task Force, February 1999.
Work in progress.

18
A. D. Keromytis, J. Ioannidis, and J. M. Smith.
Implementing IPsec.
In Proceedings of Global Internet (GlobeCom) '97, pages 1948 - 1952, November 1997.

19
RSA Laboratories.
PKCS #1: RSA Encryption Standard, version 1.5 edition, 1993.
November.

20
C. Madson and R. Glenn.
The use of HMAC-MD5-96 within ESP and AH.
Request for Comments (Proposed Standard) 2403, Internet Engineering Task Force, November 1998.

21
C. Madson and R. Glenn.
The use of HMAC-SHA-1-96 within ESP and AH.
Request for Comments (Proposed Standard) 2404, Internet Engineering Task Force, November 1998.

22
D. Maughan, M. Schertler, M. Schneider, and J. Turner.
Internet security association and key management protocol (ISAKMP).
Request for Comments (Proposed Standard) 2408, Internet Engineering Task Force, November 1998.

23
D. McDonald, C. Metz, and B. Phan.
PF_KEY Key Management API, Version 2.
Request for Comments (Informational) 2367, Internet Engineering Task Force, July 1998.

24
S. P. Miller, B. C. Neuman, J. I. Schiller, and J. H. Saltzer.
Kerberos authentication and authorization system.
Technical report, MIT, December 1987.

25
R. T. Morris.
A Weakness in the 4.2BSD Unix TCP/IP Software.
Computing Science Technical Report 117, AT&T Bell Laboratories, February 1985.

26
Data Encryption Standard, January 1977.

27
Digital Signature Standard, May 1994.

28
Secure Hash Standard, April 1995.
Also known as: 59 Fed Reg 35317 (1994).

29
D. Piper.
The internet IP security domain of interpretation for ISAKMP.
Request for Comments (Proposed Standard) 2407, Internet Engineering Task Force, November 1998.

30
J. Postel.
Domain name system structure and delegation.
Request for Comments (Informational) 1591, Internet Engineering Task Force, March 1994.

31
Jon Postel.
Internet Protocol.
Internet RFC 791, 1981.

32
Jon Postel.
Transmission Control Protocol.
Internet RFC 793, 1981.

33
Niels Provos and David Mazières.
A Future-Adaptable Password Scheme.
In Proceedings of the Annual USENIX Technical Conference, 1999.

34
R. Rivest.
The MD5 Message-Digest Algorithm.
Internet RFC 1321, April 1992.

35
Bruce Schneier.
Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish).
In Fast Software Encryption, Cambridge Security Workshop Proceedings, pages 191-204. Springer-Verlag, December 1993.

36
William Simpson.
IP in IP Tunneling.
Internet RFC 1853, October 1995.

37
Secure Syslog.
http://www.core-sdi.com/Core-SDI /english/slogging/ssyslog.html.

38
T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne, and S. Lehtinen.
SSH protocol architecture.
Internet Draft, Internet Engineering Task Force, February 1999.
Work in progress.


& D. Keromytis
4/26/1999