Back to Results
First PageMeta Content
Internet protocols / Internet standards / Cryptographic protocols / Tunneling protocols / Computer network security / IPsec / Security Parameter Index / Header checksum / Transmission Control Protocol / Computing / Network architecture / Internet


On the (In)Security of IPsec in MAC-then-Encrypt Configurations ∗ Jean Paul Degabriele
Add to Reading List

Document Date: 2010-07-27 11:01:10


Open Document

File Size: 179,18 KB

Share Result on Facebook

City

Chicago / /

Company

Vodafone Group Services Limited / Computer-Communication Networks / Virtual Private Networks / AES / AH / CBC Mode We / ESP We / IPsec / encrypted using CBC mode / /

Country

Malta / United States / /

Currency

USD / ESP / pence / /

/

Event

M&A / Product Issues / Product Recall / /

Facility

IPsec tunnel / University of London Egham / Host HA Gateway GA Gateway GB IPsec tunnel Host H B Figure / ESP Tunnel / store MAC / AH Tunnel / /

IndustryTerm

secure remote access solutions / carrier packet3 / cryptographic processing / mode algorithms / on-line tutorials giving example configurations / contribution to network / combinedmode algorithms / lower layer protocols / secure communications service / carrier packers / correct cryptographic processing / modified carrier packet / fixed carrier packet / site-to-site / upper layer protocols / replay protection services / carrier packets / protocols / possible solutions / carrier packet / upper layer protocol / trailer processing / component encryption algorithm / cryptographic processing takes / security services / carrier packet generation / encryption algorithms / real network protocols / block cipher algorithm / encryption algorithm / /

OperatingSystem

BSD / OpenSolaris / Linux / /

Organization

European Social Fund / European Union / University of London Egham / /

Person

Kenneth G. Paterson / Jean Paul Degabriele / /

Position

∗This author / General / IND-CPA / HB / network administrator / †This author / /

Product

Plaintext Attack Our / ESP replay protection / /

ProgrammingLanguage

Python / /

ProvinceOrState

Georgia / Illinois / /

Technology

encryption algorithms / encryption algorithm / Linux / combinedmode algorithms / block cipher / TCP/IP protocol / encryption / cryptography / component MAC algorithm / block cipher algorithm / MAC algorithm / mode algorithms / upper layer protocols / UDP / real network protocols / typical MAC algorithm / SSL / component encryption algorithm / upper layer protocol / IPv4 / lower layer protocols / stream cipher / /

SocialTag