This preview shows page 1. Sign up to view the full content.
Unformatted text preview: .
RFC 2104, HMAC: Keyed-Hashing for Message Authentication, H. Krawczyk, M. Bellare & R. Canetti, February
RFC 2144, The CAST-128 Encryption Algorithm, C. Adams, May 1997.
RFC 2286, Test Cases for HMAC-RIPEMD160 and HMAC-RIPEMD128, J. Kapp, February 1998.
RFC 2403, The Use of HMAC-MD5-96 within ESP and AH, C. Madson & R. Glenn, November 1998.
RFC 2404, The Use of HMAC-SHA-1-96 within ESP and AH, C. Madson & R. Glenn, November 1998.
RFC 2405, The ESP DES-CBC Cipher Algorithm With Explicit IV, C. Madson & N. Doraswamy, November 1998.
RFC 2411, IP Security Document Roadmap, R. Thayer, N. Doraswamy & R. Glenn, November 1998.
RFC 2412, The OAKLEY Key Determination Protocol, H. Orman, November 1998.
RFC 2451, The ESP CBC-Mode Cipher Algorithms, R. Pereira & R. Adams. November 1998.
RFC 3566, The AES-XCBC-MAC-96 Algorithm and Its Use With IPsec. S. Frankel. September 2003.
RFC 3602, The AES-CBC Cipher Algorithm and Its Use with IPsec. S. Frankel, R. Glenn, S. Kelly. September 2003.
RFC 3686, Using Advanced Encryption Standard (AES) Counter Mode With IPsec Encapsulating Security Payload
(ESP). R. Housley. January 2004
RFC 4120, The Kerberos Network Authentication Service (V5). C. Neuman. July 2005.
RFC 4301, Security Architecture for the Internet Protocol. S. Kent, K. Seo. December 2005.
RFC 4302, IP Authentication Header. S. Kent. December 2005.
RFC 4303 IP Encapsulating Security Payload (ESP). S. Kent. December 2005.
RFC 4305, Cryptographic Algorithm Implementation Requirements for Encapsulating Security Payload (ESP) and
Authentication Header (AH). D. Eastlake 3rd. December 2005.
RFC 4306, Internet Key Exchange (IKEv2) Protocol. C. Kaufman. December 2005
RFC 4307, Cryptographic Algorithms for Use in the Internet Key Exchange Version 2 (IKEv2). J. Schiller. December
RFC 4308, Cryptographic Suites for IPsec. P. Hoffman. December 2005. 18 VPN, IPSec and TLS Authentication Header (AH)
• Authentication Data Algorithms
• HMAC-SHA-1-96 (Must be supported)
• AES-XCBC-MAC-96 (Should be supported)
• HMAC-MD5-96 (May be supported) Data Integrity: Undetected modification to a
packet’s content in transit is not possible
View Full Document
- Spring '10