A Cryptographic Evaluation of IPsec

  title={A Cryptographic Evaluation of IPsec},
  author={Niels Ferguson and Bruce Schneier},
In February 1999, we performed an evaluation of IPsec based on the November 1998 RFCs for IPsec [KA98c, KA98a, MG98a, MG98b, MD98, KA98b, Pip98, MSST98, HC98, GK98, TDG98, PA98]. Our evaluation focused primarily on the cryptographic properties of IPsec. We concentrated less on the integration aspects of IPsec, as neither of us is intimately familiar with typical IP implementations, IPsec was a great disappointment to us. Given the quality of the people that worked on it and the time that was… CONTINUE READING
Highly Influential
This paper has highly influenced 10 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 141 citations. REVIEW CITATIONS


Publications citing this paper.

142 Citations

Citations per Year
Semantic Scholar estimates that this publication has 142 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 24 references


N C. Madson
“The ESP DES-CBC Cipher Algorithm with Explicit IV,” RFC 2405, Nov • 1998
View 3 Excerpts
Highly Influenced


B D. Wagner
“Analysis of the SSL 3.0 Protocol, The Second USENIX Workshop on Electronic Commerce Proceedings, USENIX Press, 1996, pages 29–40. USENIX Press, • 1996
View 3 Excerpts
Highly Influenced


R R. Pereira
“The ESP CBC-mode Cipher Algorithms,” RFC 2452, Nov • 1998
View 1 Excerpt

Announcing Request for Candidate Algorithm Nominations for the Advanced Encryption Standard ( AES )

R. Adams


R S. Kent
“Security Architecture for the Internet Protocol,” RFC 2401, Nov • 1998


D D. Harkins
“The Internet Key Exchange (IKE),” RFC 2409, Nov • 1998
View 2 Excerpts

Cryptanalysis of Microsoft's Point-to-Point Tunneling Protocol (PPTP)

ACM Conference on Computer and Communications Security • 1998


R C. Madson
“The Use of HMAC-SHA-1-96 Within ESP and AH,” RFC 2404, Nov • 1998

Similar Papers

Loading similar papers…