Differential cryptanalysis of the data encryption standard
Differential cryptanalysis of the data encryption standard
Security Mechanisms in High-Level Network Protocols
ACM Computing Surveys (CSUR)
Security problems in the TCP/IP protocol suite
ACM SIGCOMM Computer Communication Review
Differential Cryptanalysis of the Full 16-Round DES
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
A "bump in the stack" encryptor for MS-DOS systems
SNDSS '96 Proceedings of the 1996 Symposium on Network and Distributed System Security (SNDSS '96)
On Message Integrity in Cryptographic Protocols
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Protocol Design for Integrity Protection
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
A flow-based approach to datagram security
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
A security architecture for the Internet protocol
IBM Systems Journal
Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
Authenticated encryption in SSH: provably fixing the SSH binary packet protocol
Proceedings of the 9th ACM conference on Computer and communications security
Key Exchange in IPSec: Analysis of IKE
IEEE Internet Computing
Computer
Formal Eavesdropping and Its Computational Interpretation
TACS '01 Proceedings of the 4th International Symposium on Theoretical Aspects of Computer Software
An End-to-End Authentication Protocol in Wireless Application Protocol
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Attacking Predictable IPsec ESP Initialization Vectors
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS ...
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Side-Channel Attacks on Symmetric Encryption Schemes: The Case for Authenticated Encryption
Proceedings of the 11th USENIX Security Symposium
Probable Plaintext Cryptanalysis of the IP Security Protocols
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
ACM Transactions on Information and System Security (TISSEC)
Security considerations for IEEE 802.15.4 networks
Proceedings of the 3rd ACM workshop on Wireless security
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Lost in Translation: Theory and Practice in Cryptography
IEEE Security and Privacy
Access control protocols with two-layer architecture for wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A survey of algebraic properties used in cryptographic protocols
Journal of Computer Security
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Analysis of the SSL 3.0 protocol
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Proceedings of the 2007 ACM workshop on Scalable trusted computing
Secure VPNs for Trusted Computing Environments
Trust '09 Proceedings of the 2nd International Conference on Trusted Computing
A cryptographic tour of the IPsec standards
Information Security Tech. Report
Experiences with host-to-host IPsec
Proceedings of the 13th international conference on Security protocols
On the (in)security of IPsec in MAC-then-encrypt configurations
Proceedings of the 17th ACM conference on Computer and communications security
How secure is WiFi MAC layer in comparison with IPsec for classified environments?
Proceedings of the 14th Communications and Networking Symposium
Combining message encryption and authentication
Annales UMCS, Informatica - Cryptography and data protection
Secure initialization vector transmission on IP security
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
Cryptography in theory and practice: the case of encryption in IPsec
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
IPsec over IEEE 802.15.4 for low power and lossy networks
Proceedings of the 11th ACM international symposium on Mobility management and wireless access
Hi-index | 0.00 |
The Internet Engineering Task Force (IETF) is in the proces of adopting standards for IP-layer encryption and authentication (IPSEC). We describe a number of attacks against various versions of these protocols, including confidentiality failures and authentication failures. The implications of these attacks are troubling for the utility of this entire effort.