Chapter 5: Internet Security Protocols


In this chapter, we overview and briefly discuss some cryptographic security protocols that have been proposed, specified, and partly implemented for the Internet and that can also be used on the WWW. In particular, we introduce the topic in Section 5.1, address security protocols for the network access, Internet, transport, and application layers in Sections 5.2 to 5.5, and draw some conclusions in Section 5.6.

5.1    Introduction

There is a strong consensus that providing security services in computer networks and distributed systems requires the use of cryptographic techniques, and that these techniques must be integrated into security protocols accordingly. This is also true for the Internet and the WWW. Consequently, many cryptographic security protocols have been proposed, specified, implemented, and deployed on the Internet and the WWW in the past. Some of these protocols have been successful, whereas others have not found their market shares and have disappeared accordingly .

In the case of TCP/IP-based networks, cryptographic security protocols can operate at any layer of the corresponding communications protocol suite. Consequently, there are proposals for providing security services at the network access, Internet, transport, and application layers. There are even some proposals to provide security services above the application layer. All of these possibilities are overviewed and briefly discussed in the sequel. Keep in mind, however, that the treatment in this book is rather short, and that a more detailed overview and discussion can be found in Part III of [1]. Also, the chapter provides a long list of references for further study.




Security Technologies for the World Wide Web
Security Technologies for the World Wide Web, Second Edition
ISBN: 1580533485
EAN: 2147483647
Year: 2003
Pages: 142
Authors: Rolf Oppliger

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net