Authentication and authenticated key exchanges
Designs, Codes and Cryptography
A cryptographic file system for UNIX
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish)
Fast Software Encryption, Cambridge Security Workshop
Probable Plaintext Cryptanalysis of the IP Security Protocols
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
A future-adaptive password scheme
ATEC '99 Proceedings of the annual conference on USENIX Annual Technical Conference
Implementing a distributed firewall
Proceedings of the 7th ACM conference on Computer and communications security
Cryptography as an operating system service: A case study
ACM Transactions on Computer Systems (TOCS)
Tagging data in the network stack: mbuf_tags
BSDC'03 Proceedings of the BSD Conference 2003 on BSD Conference
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Implementing internet key exchange (IKE)
ATEC '00 Proceedings of the annual conference on USENIX Annual Technical Conference
Cryptanalysis of the windows random number generator
Proceedings of the 14th ACM conference on Computer and communications security
Games for extracting randomness
Proceedings of the 5th Symposium on Usable Privacy and Security
Cryptanalysis of the random number generator of the Windows operating system
ACM Transactions on Information and System Security (TISSEC)
Experience with the keynote trust management system: applications and future directions
iTrust'03 Proceedings of the 1st international conference on Trust management
Embedding covert channels into TCP/IP
IH'05 Proceedings of the 7th international conference on Information Hiding
Hi-index | 0.00 |
Cryptographic mechanisms are an important security component of an operating system in securing the system itself and its communication paths. Indeed, in many situations, cryptography is the only tool that can solve a particular problem, e.g., network-level security. While cryptography by itself does not guarantee security, when applied correctly, it can significantly improve overall security. Since one of the main foci of the OpenBSD system is security, various cryptographic mechanisms are employed in a number of different roles. This paper gives an overview of the cryptography employed in OpenBSD. We discuss the various components (IPsec, SSL libraries, stronger password encryption, Kerberos IV, random number generators, etc.), their role in system security, and their interactions with the rest of the system (and, where applicable, the network).