Cryptographic Encapsulation in the New ENC-DNSSEC Protocol

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

New Protocol E-DNSSEC to Enhance DNSSEC Security

The Domain Name System (DNS) is an essential component of the internet infrastructure. Due to its importance, securing DNS becomes a necessity for current and future networks. DNSSEC, the extended version of DNS has been developed in order to provide security services. Unfortunately, DNSSEC doesn’t offer query privacy; we can see all queries sent to resolver in clear. In this paper, we evaluate...

متن کامل

Cryptographic Algorithm Identifier Allocation for DNSSEC

This document specifies how DNSSEC cryptographic algorithm identifiers in the IANA registries are allocated. It changes the requirement from "standard required" to "RFC Required". It does not change the list of algorithms that are recommended or required for DNSSEC implementations. Information about the current status of this document, any errata, and how to provide feedback on it may be obtain...

متن کامل

Signaling Cryptographic Algorithm Understanding in DNS Security Extensions (DNSSEC)

The DNS Security Extensions (DNSSEC) were developed to provide origin authentication and integrity protection for DNS data by using digital signatures. These digital signatures can be generated using different algorithms. This document specifies a way for validating end-system resolvers to signal to a server which digital signature and hash algorithms they support. The extensions allow the sign...

متن کامل

What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specification in Formal Cryptographic Protocol Analysis

Much attention has been paid to the design of languages for the speci cation of cryptographic protocols. However, the ability to specify their desired behavior correctly is also important; indeed many perceived protocol aws arise out of a misunderstanding of the protocol's requirements. In this talk we give a brief survey of the history of requirements speci cation in formal analysis of cryptog...

متن کامل

On Protocol Security in the Cryptographic Model

It seems to be a generally acknowledged fact that you should never trust a computer and that you should trust the person operating the computer even less. This in particular becomes a problem when the party that you do not trust is one which is separated from you and is one on which you depend, e.g. because that party is the holder of some data or some capability that you need in order to opera...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Security and Its Applications

سال: 2016

ISSN: 1738-9976,1738-9976

DOI: 10.14257/ijsia.2016.10.6.31