Cryptographic Encapsulation in the New ENC-DNSSEC Protocol
نویسندگان
چکیده
منابع مشابه
New Protocol E-DNSSEC to Enhance DNSSEC Security
The Domain Name System (DNS) is an essential component of the internet infrastructure. Due to its importance, securing DNS becomes a necessity for current and future networks. DNSSEC, the extended version of DNS has been developed in order to provide security services. Unfortunately, DNSSEC doesn’t offer query privacy; we can see all queries sent to resolver in clear. In this paper, we evaluate...
متن کاملCryptographic Algorithm Identifier Allocation for DNSSEC
This document specifies how DNSSEC cryptographic algorithm identifiers in the IANA registries are allocated. It changes the requirement from "standard required" to "RFC Required". It does not change the list of algorithms that are recommended or required for DNSSEC implementations. Information about the current status of this document, any errata, and how to provide feedback on it may be obtain...
متن کاملSignaling Cryptographic Algorithm Understanding in DNS Security Extensions (DNSSEC)
The DNS Security Extensions (DNSSEC) were developed to provide origin authentication and integrity protection for DNS data by using digital signatures. These digital signatures can be generated using different algorithms. This document specifies a way for validating end-system resolvers to signal to a server which digital signature and hash algorithms they support. The extensions allow the sign...
متن کاملWhat Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specification in Formal Cryptographic Protocol Analysis
Much attention has been paid to the design of languages for the speci cation of cryptographic protocols. However, the ability to specify their desired behavior correctly is also important; indeed many perceived protocol aws arise out of a misunderstanding of the protocol's requirements. In this talk we give a brief survey of the history of requirements speci cation in formal analysis of cryptog...
متن کاملOn Protocol Security in the Cryptographic Model
It seems to be a generally acknowledged fact that you should never trust a computer and that you should trust the person operating the computer even less. This in particular becomes a problem when the party that you do not trust is one which is separated from you and is one on which you depend, e.g. because that party is the holder of some data or some capability that you need in order to opera...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Security and Its Applications
سال: 2016
ISSN: 1738-9976,1738-9976
DOI: 10.14257/ijsia.2016.10.6.31