Problem Areas for the IP Security Protocols

  title={Problem Areas for the IP Security Protocols},
  author={Steven M. Bellovin},
  booktitle={USENIX Security Symposium},
The Internet Engineering Task Force IETF is in the process of adopting standards for IP layer en cryption and authentication IPSEC We describe a number of attacks against various versions of these protocols including con dentiality failures and au thentication failures The implications of these at tacks are troubling for the utility of this entire ef fort 
Highly Influential
This paper has highly influenced 11 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 173 citations. REVIEW CITATIONS

From This Paper

Topics from this paper.


Publications citing this paper.
Showing 1-10 of 103 extracted citations

Active Network Security

View 12 Excerpts
Highly Influenced

Attacking the IPsec Standards in Encryption-only Configurations

2007 IEEE Symposium on Security and Privacy (SP '07) • 2007
View 11 Excerpts
Highly Influenced

Cryptography in Theory and Practice: The Case of Encryption in IPsec

IACR Cryptology ePrint Archive • 2005
View 12 Excerpts
Highly Influenced

Security considerations for IEEE 802.15.4 networks

Workshop on Wireless Security • 2004
View 3 Excerpts
Highly Influenced

Formal characterization and automated analysis of known-pair and chosen-text attacks

IEEE Journal on Selected Areas in Communications • 2000
View 3 Excerpts
Highly Influenced

173 Citations

Citations per Year
Semantic Scholar estimates that this publication has 173 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-6 of 6 references

Gligor . On message integrity in cryptographic protocols

Stuart G. Stubblebine, D. Virgil
Proc . IEEE Computer SocietySymposium on Research in Security andPrivacy • 1996

Gligor . Protocol design for integrity protection

Stuart G. Stubblebine, D. Virgil
InProc . IEEE Computer Society Symposiumon Research in Security and Privacy , pages • 1993

Bellovin . Security problemsin the TCP / IP protocol suite

M. Steven

Di erentialcryptanalysis of DESlike cryptosystems

Eli Biham
Journal of Cryptology

Similar Papers

Loading similar papers…