Demystifying the IPsec puzzle /
Main Author: | |
---|---|
Format: | Book |
Language: | English |
Published: |
Boston, MA :
Artech House,
2001.
|
Series: | Artech House computer security series
|
Subjects: |
Table of Contents:
- ""3.7 ESP Header Processing for Inbound Messages 49""""3.8 Complications 52""; ""3.9 Criticisms and Counterclaims 52""; ""3.10 Threat Mitigation 54""; ""3.11 Why Two Security Headers? 55""; ""3.12 Summary 56""; ""3.13 Further Reading 56""; ""References 57""; ""4 The Third Puzzle Piece: The Cryptographic Algorithms 59""; ""4.1 Underlying Principles 60""; ""4.2 Authentication Algorithms 62""; ""4.3 The ESP Header Encryption Algorithms 68""; ""4.4 Complications 78""; ""4.5 Public Key Cryptography 79""; ""4.6 Conclusion 82""; ""4.7 Further Reading 82""
- ""5.14 Lifetimes 101""""5.15 Vendor IDs 101""; ""5.16 The Phase 1 Negotiation 101""; ""5.17 The Phase 2 Negotiation 112""; ""5.18 New Group Mode 117""; ""5.19 Informational Exchanges 118""; ""5.20 The ISAKMP Header 119""; ""5.21 The Generic Payload Header 120""; ""5.22 The IKE State Machine 121""; ""5.23 The Origins of IKE 122""; ""5.24 An Example 122""; ""5.25 Criticisms and Counterclaims 123""; ""5.26 Threat Mitigation 125""; ""5.27 Summary 125""; ""5.28 Further Reading 126""; ""References 127""; ""6 The Fifth Puzzle Piece: IKE and the Road Warrior 129""