Abstract
After many years, cryptography is coming to the Internet. Some protocols are in common use; more are being developed and deployed. The major issue has been one of cryptographic engineering: turning academic papers into a secure, implementable specification. But there is missing science as well, especially when it comes to efficient implementation techniques.
Chapter PDF
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Matt Blaze, G. Bleumer, and Martin Strauss. Divertible protocols and atomic proxy cryptography. In Proceedings of Eurocrypt '98, 1998. to appear.
M. Bellare, R. Canetti, and H. Krawczyk. Keying hash functions for message authentication. In Advances in Cryptology: Proceedings of CRYPTO '96, pages 1–15. Springer-Verlag, 1996.
Steven M. Bellovin. Using the domain name system for system breakins. In Proceedings of the Fifth Usenix Unix Security Symposium, pages 199–208, Salt Lake City, UT, June 1995.
Steven M. Bellovin. Problem areas for the IP security protocols. In Proceedings of the Sixth Usenix Unix Security Symposium, pages 205–214, July 1996.
Steven M. Bellovin. Probable plaintext cryptanalysis of the IP security protocols. In Proceedings of the Symposium on Network and Distributed System Security, pages 155–160, 1997.
Matt Blaze, Joan Feigenbaum, and Jack Lacy. Decentralized trust management. In IEEE Symposium on Security and Privacy, pages 164–173, 1996.
Matt Blaze, Joan Feigenbaum, and Martin Strauss. Compliance checking in the PolicyMaker trust management system. In Proceedings of the 2nd Financial Crypto Conference, 1998. to appear.
J. Bound, Y. Rekhter, S. Thomson, and P. Vixie. Dynamic updates in the domain name system (DNS UPDATE). Request for Comments (Proposed Standard) 2136, Internet Engineering Task Force, April 1997. (Obsoletes RFC1035).
W. Diffie, P.C. van Oorschot, and M.J. Wiener. Authentication and authenticated key exchange. Designs, Codes and Cryptography, page 107, 1992.
D. Eastlake and C. Kaufman. Domain name system security extensions. Request for Comments (Proposed Standard) 2065, Internet Engineering Task Force, January 1997. (Obsoletes RFC1034).
Ralf Hauser, Tony Przgienda, and Gene Tsudik. Reducing the cost of security in link-state routing. In Proceedings of the Symposium on Network and Distributed System Security, pages 93–99, 1997.
Laurent Joncheray. A simple active attack against TCP. In Proceedings of the Fifth Usenix Unix Security Symposium, Salt Lake City, UT, 1995.
Hugo Krawczyk. SKEME: A versatile secure key exchange mechanism for internet. In Proceedings of the Internet Society Symposium on Network and Distributed System Security, pages 114–127, February 1996.
S.L. Murphy and M.R. Badger. Digital signature protection of the OSPf routing protocol. In Proceedings of the Symposium on Network and Distributed System Security, pages 93–102, 1996.
P. Mockapetris. Domain names: Concepts and facilities. RFC 882, Internet Engineering Task Force, November 1983. (Obsoleted by RFC1034); (Updated by RFC973).
NIST. Secure hash standard (SHS), April 1995. Federal Information Processing Standards Publication 180-1.
B. Preneel and Paul C. van Oorschot. MDx-MAC and building fast MACs from hash functions. In Proceedings of CRYPTO '95, pages 1–14, 1995.
B. Preneel and Paul C. van Oorschot. On the security of two mac algorithms. In Proceedings of Eurocrypt '96, pages 19–32, 1996.
R. Rivest. The MD5 message-digest algorithm. Request for Comments (Informational) 1321, Internet Engineering Task Force, April 1992.
Ronald Rivest. All-or-nothing encryption and the package transform. In Proceedings of the Fast Software Encryption Conference, 1997. To appear.
Ronald Rivest and Butler Lampson, 1996. Several papers can be found at http://theory.lcs.mit.edu/~cis/sdsi.html.
K.E. Sirois and S.T. Kent. Securing the nimrod routing architecture. In Proceedings of the Symposium on Network and Distributed System Security, pages 74–84, 1997.
Bruce Schneier and P. Mudge. Cryptanalysis of Microsoft's Point-to-Point Tunneling Protocol (PPTP), November 1998. 5th ACM Conference on Computer and Communications Security, to appear.
B.R. Smith, S. Murthy, and J.J. Garcia-Luna-Aceves. Securing distance-vector routing protocols. In Proceedings of the Symposium on Network and Distributed System Security, pages 85–92, 1997.
Joseph D. Touch. Performance analysis of MD5. In Proceedings of ACM SIGCOMM '95, pages 77–86, 1996.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bellovin, S.M. (1998). Cryptography and the internet. In: Krawczyk, H. (eds) Advances in Cryptology — CRYPTO '98. CRYPTO 1998. Lecture Notes in Computer Science, vol 1462. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0055719
Download citation
DOI: https://doi.org/10.1007/BFb0055719
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64892-5
Online ISBN: 978-3-540-68462-6
eBook Packages: Springer Book Archive