Application Layer Security Protocols By: Mudassar Hayee Jasbir Singh “This report was prepared for Professor L. Orozco-Barbosa in partial fulfillment of the requirements for the course ELG/CEG 4183” SITE University of Ottawa Topics That Will Be Discussed Security over the internet
Related searches for 71510 1 Application Layer Security Protocols
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
By: Mudassar Hayee
“This report was prepared for Professor L. Orozco-Barbosa in partial fulfillment of the requirements for the course ELG/CEG 4183”
University of Ottawa
Authentication is a problem that can be tackled by providing a password to access the resource. A key distribution system to authenticate a system (ie. public key encryption) makes it very secure.
- when somebody digitally signs a message, it adds a copy of his/her public key to it…..and somebody could extract the key from the message, posing a potential security threat.
- to prevent this, encryption is also necessary to protect the key itself, but difficult to implement
Example: Authentication via Kerberos 4 after TLS negotiation
Angerbauer, Ralf. Internet Mail Security. Presentation for ECE575 – Data Security and Cryptography. Spring 1998. http://www.security.ece.orst.edu/koc/ece575/98Project/Angerbauer/sld001.htm
Ashley, Paul. SESAME. August 20, 1998. http://www.isrc.qut.edu.au/sesame/index.html
Boe, Michael and Altman, Jeffrey. TLS-based Telnet Security. IETF Internet-Draft. The Internet Society, October 24th, 2000. http://www.ietf.org/internet-drafts/draft-ietf-tn3270e-telnet-tls-05.txt
Chochran, Jerry. Secure Messaging Solutions for Exchange. Exchange & Outlook Update: Windows2000 Magazine. January 31st, 2001. http://www.win2000mag.com/Articles/Index.cfm?ArticleID=19815&Key=Secure%20MIME%20%28S%2FMIME%29
Clercq, Jan De. Certificate Validation. Windows2000 Magazine. June 1st, 2000. http://www.win2000mag.com/Articles/Index.cfm?ArticleID=8335&Key=Secure%20MIME%20%28S%2FMIME%29
Curtin, Matt and Ranum, Marcus J. Internet Firewalls: Frequently Asked Questions. December 1st, 2000. http://www.interhack.net/pubs/fwfaq/
Oppliger, Rolf. Securing the Internet. INET'99: The International Global Summit. McEnery Convention Centre, San Jose, California, United States. June 22-25, 1999. http://www.ifi.unizh.ch/~oppliger/Docs/PowerPoint/INET_99/sld001.htm
Vijayan, Jaikumar. Microsoft issues new security patch for Win2k telnet security hole. ComputerWorld, September 22, 2000. http://www.computerworld.com/cwi/story/0,1199,NAV47_STO51149,00.html
Vanderwauver, Mark and Govaerts, Rene and Vanderwalle, Joos. Overview of Authentication Protocols. http://www.esat.kuleuven.ac.be/cosic/sesame/papers/carnahan.pdf