Security Architecture for the Internet Protocol

Internet Drafts are draft documents valid for a maximum of 6 months. Internet Drafts may be updated, replaced, or obsoleted by other documents at any time. It is not appropriate to use Internet Drafts as reference material or to cite them other than as "work in progress". This particular Internet Draft is a product of the IETF's IP Security (IPsec) working group. It is intended that a future version of this draft be submitted to the IESG for publication as a Draft Standard RFC. Comments about this draft may be sent to the author or to the IPsec WG mailing list <ipsec@tis.com>.

[1]  D. Mant Prevention , 1994, The Lancet.

[2]  Keith McCloghrie,et al.  Security Protocols for version 2 of the Simple Network Management Protocol (SNMPv2) , 1993, RFC.

[3]  John Linn,et al.  Privacy enhancement for Internet electronic mail: Part II - certificate-based key management , 1987, RFC.

[4]  Matt Blaze,et al.  The Architecture and Implementation of Network Layer Security in UNIX , 1993, USENIX Security Symposium.

[5]  David A. Bell,et al.  Secure computer systems: mathematical foundations and model , 1973 .

[6]  P. S. Tasker,et al.  DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA , 1985 .

[7]  John T. Kohl,et al.  The Kerberos Network Authentication Service (V5 , 2004 .

[8]  R. Hinden,et al.  Internet protocol, version 6 , 1995 .

[9]  Donald E. Eastlake,et al.  Domain Name System Security Extensions , 1997, RFC.

[10]  Naganand Doraswamy,et al.  Combined 3DES-CBC, HMAC and Replay Prevention Security Transform , 1996 .

[11]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[12]  Roger M. Needham,et al.  Using encryption for authentication in large networks of computers , 1978, CACM.

[13]  Stephen T. Kent U.S. Department of Defense Security Options for the Internet Protocol , 1991, RFC.

[14]  Michael J. Oehler,et al.  HMAC-MD5 IP Authentication with Replay Prevention , 1997, RFC.

[15]  Christian Huitema,et al.  Report of IAB Workshop on Security in the Internet Architecture - February 8-10, 1994 , 1994, RFC.

[16]  Roger M. Needham,et al.  Authentication revisited , 1987, OPSR.

[17]  S. M. Bellovin,et al.  Security problems in the TCP/IP protocol suite , 1989, CCRV.

[18]  Jon Postel Internet Official Protocol Standards , 1993, RFC.

[19]  Randall J. Atkinson,et al.  On Internet Authentication , 1994, RFC.

[20]  D. Estrin,et al.  RSVP: a new resource reservation protocol , 1993, IEEE Communications Magazine.

[21]  Stephen T. Kent,et al.  Security Mechanisms in High-Level Network Protocols , 1983, CSUR.