Authentication and Confidentiality via IPsec
Abstract. The IP security protocols (IPsec) may be used via security gateways that apply cryptographic operations to provide security servi- ces to datagrams, and this mode of use is supported by an increasing number of commercial products. In this paper, we formalize the types of authentication and confidentiality goal that IPsec is capable of achie- ving, and we provide criteria that entail that a network with particular IPsec processing achieves its security goals. This requires us to formalize the structure of networks using IPsec, and the state of packets relevant to IPsec processing. We can then prove confidentiality goals as invariants of the formalized systems. Authentica- tion goals are formalized in the manner of [9], and a simple proof method using “unwinding sets” is introduced. We end the paper by explaining the network threats that are prevented by correct IPsec processing.
- 粉丝: 0
- 资源: 2
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助