Next: About this document ...
Up: Cryptography in OpenBSD: An
Previous: Disclaimer
- 1
-
R. Atkinson.
IP Authentication Header.
RFC 1826, August 1995.
- 2
-
R. Atkinson.
IP Encapsulating Security Payload.
RFC 1827, August 1995.
- 3
-
R. Atkinson.
Security Architecture for the Internet Protocol.
RFC 1825, August 1995.
- 4
-
S. Bellovin.
Probable Plaintext Cryptanalysis of the IP Security Protocols.
In Proceedings of the Symposium on Network and Distributed
System Security, pages 155-160, February 1997.
- 5
-
M. Blaze.
A Cryptographic File System for Unix.
In Proc. of the 1st ACM Conference on Computer and
Communications Security, November 1993.
- 6
-
T. Dierks and C. Allen.
The TLS protocol version 1.0.
Request for Comments (Proposed Standard) 2246, Internet Engineering
Task Force, January 1999.
- 7
-
W. Diffie and M.E. Hellman.
New Directions in Cryptography.
IEEE Transactions on Information Theory, IT-22(6):644-654,
Nov 1976.
- 8
-
W. Diffie, P.C. van Oorschot, and M.J. Wiener.
Authentication and Authenticated Key Exchanges.
Designs, Codes and Cryptography, 2:107-125, 1992.
- 9
-
D. Eastlake, 3rd, and C. Kaufman.
Domain name system security extensions.
Request for Comments (Proposed Standard) 2065, Internet Engineering
Task Force, January 1997.
- 10
-
N. Haller.
The S/KEY one-time password system.
Request for Comments (Informational) 1760, Internet Engineering Task
Force, February 1995.
- 11
-
Neil M. Haller.
the s/key one-time password system.
In Proceedings of the ISOC Symposium on Network and
Distributed System Security, 1994.
- 12
-
D. Harkins and D. Carrel.
The internet key exchange (IKE).
Request for Comments (Proposed Standard) 2409, Internet Engineering
Task Force, November 1998.
- 13
-
P. Karn and W. Simpson.
Photuris: Session-key management protocol.
Request for Comments (Experimental) 2522, Internet Engineering Task
Force, March 1999.
- 14
-
S. Kent and R. Atkinson.
IP authentication header.
Request for Comments (Proposed Standard) 2402, Internet Engineering
Task Force, November 1998.
- 15
-
S. Kent and R. Atkinson.
IP encapsulating security payload (ESP).
Request for Comments (Proposed Standard) 2406, Internet Engineering
Task Force, November 1998.
- 16
-
S. Kent and R. Atkinson.
Security architecture for the internet protocol.
Request for Comments (Proposed Standard) 2401, Internet Engineering
Task Force, November 1998.
- 17
-
A. Keromytis and N. Provos.
The use of HMAC-RIPEMD-160-96 within ESP and AH.
Internet Draft, Internet Engineering Task Force, February 1999.
Work in progress.
- 18
-
A. D. Keromytis, J. Ioannidis, and J. M. Smith.
Implementing IPsec.
In Proceedings of Global Internet (GlobeCom) '97, pages 1948 -
1952, November 1997.
- 19
-
RSA Laboratories.
PKCS #1: RSA Encryption Standard, version 1.5 edition, 1993.
November.
- 20
-
C. Madson and R. Glenn.
The use of HMAC-MD5-96 within ESP and AH.
Request for Comments (Proposed Standard) 2403, Internet Engineering
Task Force, November 1998.
- 21
-
C. Madson and R. Glenn.
The use of HMAC-SHA-1-96 within ESP and AH.
Request for Comments (Proposed Standard) 2404, Internet Engineering
Task Force, November 1998.
- 22
-
D. Maughan, M. Schertler, M. Schneider, and J. Turner.
Internet security association and key management protocol (ISAKMP).
Request for Comments (Proposed Standard) 2408, Internet Engineering
Task Force, November 1998.
- 23
-
D. McDonald, C. Metz, and B. Phan.
PF_KEY Key Management API, Version 2.
Request for Comments (Informational) 2367, Internet Engineering Task
Force, July 1998.
- 24
-
S. P. Miller, B. C. Neuman, J. I. Schiller, and J. H. Saltzer.
Kerberos authentication and authorization system.
Technical report, MIT, December 1987.
- 25
-
R. T. Morris.
A Weakness in the 4.2BSD Unix TCP/IP Software.
Computing Science Technical Report 117, AT&T Bell Laboratories,
February 1985.
- 26
-
Data Encryption Standard, January 1977.
- 27
-
Digital Signature Standard, May 1994.
- 28
-
Secure Hash Standard, April 1995.
Also known as: 59 Fed Reg 35317 (1994).
- 29
-
D. Piper.
The internet IP security domain of interpretation for ISAKMP.
Request for Comments (Proposed Standard) 2407, Internet Engineering
Task Force, November 1998.
- 30
-
J. Postel.
Domain name system structure and delegation.
Request for Comments (Informational) 1591, Internet Engineering Task
Force, March 1994.
- 31
-
Jon Postel.
Internet Protocol.
Internet RFC 791, 1981.
- 32
-
Jon Postel.
Transmission Control Protocol.
Internet RFC 793, 1981.
- 33
-
Niels Provos and David Mazières.
A Future-Adaptable Password Scheme.
In Proceedings of the Annual USENIX Technical Conference,
1999.
- 34
-
R. Rivest.
The MD5 Message-Digest Algorithm.
Internet RFC 1321, April 1992.
- 35
-
Bruce Schneier.
Description of a New Variable-Length Key, 64-Bit Block Cipher
(Blowfish).
In Fast Software Encryption, Cambridge Security Workshop
Proceedings, pages 191-204. Springer-Verlag, December 1993.
- 36
-
William Simpson.
IP in IP Tunneling.
Internet RFC 1853, October 1995.
- 37
-
Secure Syslog.
https://www.core-sdi.com/Core-SDI
/english/slogging/ssyslog.html.
- 38
-
T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne, and S. Lehtinen.
SSH protocol architecture.
Internet Draft, Internet Engineering Task Force, February 1999.
Work in progress.
& D. Keromytis
4/26/1999