Back to Results
First PageMeta Content
Internet standards / Key management / Cryptographic protocols / Network Time Protocol / Time server / Public-key cryptography / Man-in-the-middle attack / Key / One-time password / Cryptography / Computing / Internet protocols


Cryptographic Authentication for Real-Time Network Protocols1,2 David L. Mills3 Abstract This paper describes a new security model and authentication scheme for distributed, real-time network protocols used in time synch
Add to Reading List

Document Date: 1998-12-02 17:00:16


Open Document

File Size: 43,43 KB

Share Result on Facebook

City

Newark / /

Company

Digital Equipment Corporation / NTP / CBC / RSA Laboratories / Qualcomm / /

/

Event

FDA Phase / /

Facility

University of Delaware / /

IndustryTerm

cryptographic technology / directory services / secondary server / simultaneous server / Internet Draft / Internet time synchronization / event scheduling applications / computation-intense algorithms / public-key infrastructure / Internet Drafts / secure directory services / real-time network protocols / network security services / point-to-multipoint communications paradigms / potential server / certificate media / session key management protocol / hierarchical network / key to every server / drop-in security devices / public-key algorithms / web servers / busiest Internet servers / message digest algorithm / large network / cryptographic algorithms / security services / Internet security association / inexhaustible processor / authenticated network services / legitimate server / hash algorithms / message-digest algorithm / cryptographic media lifetimes / time-sensitive protocols / lifetime-enforced cryptographic media / time-sensitive protocol / similar protocols / recent internet drafts / generic Internet security models / autokey server / mitigation algorithms / frequency dissemination services / similar real-time protocols / /

OperatingSystem

Unix / VMS / Microsoft Windows / /

Organization

National Security Agency / MIT / Northeastern Center for Electrical Engineering Education Contract A303 / Computer Engineering Department / University of Delaware / National Bureau of Standards / NSF Division / /

/

Position

author / Private / /

Product

MD5 / C-0046 / RFC-1305 / /

ProvinceOrState

Delaware / /

PublishedMedium

Theoretical Computer Science / /

Technology

Alpha / 3.4 Protocol / Information Technology / PKI / data encryption / computation-intense algorithms / real-time network protocols / known public-key algorithms / private key / secret key / message-digest algorithm / key management protocol / public-key infrastructure / encryption / similar real-time protocols / cryptography / distributed / real-time network protocols / public key / mitigation algorithms / DNS / Introduction The Network Time Protocol / MD5 message digest algorithm / Photuris session key management protocol / hash algorithms / file sharing / http / /

URL

www.eecis.udel.edu/~ntp / http /

SocialTag