Encrypting the Internet. Phil Karn 18 April 2000 email@example.com http://people.qualcomm.com/karn. Overview. Threat models Cryptography basics Layer tradeoffs Cryptographic protocols on the Internet Crypto politics. Threat Models I.e, What are you worried about?.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
18 April 2000
data, variable amount
128 bits (MD5)
160 bits (SHA-1)
()d mod n
()e mod n
Header & Data
Two types of IPSec packets:
Authentication Header (AH), protocol number 51
Encapsulating Security Protocol (ESP), proto 50
Both carry the original IP protocol field
Note “end-to-end header and data” can be another
IP datagram! This is tunnel mode