重复性攻击保护的HMAC-MD5 IP 认证( 三 )


缺点进行了细致的讨论 。
致谢
本文的完成很大程度地基于HugoKrawczyk.写的文章,使用的格式来源于WilliamSimpson和
Perry的文章,重复性攻击保护直接引自JimHughes的文章 。
参考文献
[RFC-1825]Atkinson,R.,"SecurityArchitecturefortheInternet
Protocol",RFC1852,NavalResearchLaboratory,
July1995.
[RFC-1826]Atkinson,R.,"IPAuthenticationHeader",
RFC1826,August1995.
[RFC-1828]Metzger,P.,andW.Simpson,"IPAuthenticationusing
KeyedMD5",RFC1828,August1995.
[RFC-1321]Rivest,R.,"TheMD5Message-DigestAlgorithm",
RFC1321,April1992.
[HMAC-MD5]Krawczyk,H.,Bellare,M.,andR.Canetti,
"HMAC:Keyed-HashingforMessageAuthentication",
RFC2104,February1997.
[ESP-DES-MD5]Hughes,J.,"CombinedDES-CBC,MD5,andReplay
PreventionSecurityTransform",WorkinProgress.
作者地址
MichaelJ.Oehler
NationalSecurityAgency
Atn:R23,INFOSECResearchandDevelopment
9800SavageRoad
FortMeade,MD20755
EMail:mjo@tycho.ncsc.mil
RobertGlenn
NIST
Building820,Room455
Gaithersburg,MD20899
EMail:rob.glenn@nist.gov


推荐阅读