4. Checksum Algorithm Profile................. 9
نویسنده
چکیده
This document describes a framework for defining encryption and checksum mechanisms for use with the Kerberos protocol, defining an abstraction layer between the Kerberos protocol and related protocols, and the actual mechanisms themselves. The document also defines several mechanisms. Some are taken from RFC 1510, modified in form to fit this new framework and occasionally modified in content when the old specification was incorrect. New mechanisms are presented here as well. This document does NOT indicate which mechanisms may be considered "required to implement".
منابع مشابه
A Limited-Global-Informatin-Based Multicasting Scheme for Faulty Hypercubes
One important performance measure of CED designs is how quickly the error can be detected. The input checksum of a set of input data Can be computed while they propagate through the network. ne time for calculating the output checksum, however, should [9] P.D. Welch, “A fixed-point fast Fourier transform error analysis,” IEEE Truns. Audio Electroacoustics, vol. 17, pp. 151-157, June 1969. [IO] ...
متن کاملRFC 4757 RC 4 - HMAC December 2006
The Microsoft Windows 2000 implementation of Kerberos introduces a new encryption type based on the RC4 encryption algorithm and using an MD5 HMAC for checksum. This is offered as an alternative to using the existing DES-based encryption types. The RC4-HMAC encryption types are used to ease upgrade of existing Windows NT environments, provide strong cryptography (128-bit key lengths), and provi...
متن کاملINTERNET - DRAFT ZLIB Compressed Data Format
This specification defines a lossless compressed data format. The data can be produced or consumed, even for an arbitrarily long sequentially presented input data stream, using only an a priori bounded amount of intermediate storage. The format presently uses the DEFLATE compression method but can be easily extended to use other compression methods. It can be implemented readily in a manner not...
متن کاملZLIB Compressed Data Format Specification
This specification defines a lossless compressed data format. The data can be produced or consumed, even for an arbitrarily long sequentially presented input data stream, using only an a priori bounded amount of intermediate storage. The format presently uses the DEFLATE compression method but can be easily extended to use other compression methods. It can be implemented readily in a manner not...
متن کاملA Bibliography of Papers in Lecture Notes in Computer Science (1990)
10]. Abuse [75]. Abuse-Free [75]. Access [64]. Active [32]. Addition [110]. Adolescence [1]. Age [61]. Agent [125]. Algebraic [63]. Algebraic-Code [63]. Algorithm [88]. Algorithms [13]. Alive [6]. Almost [60]. Alternative [19]. and/or [44]. Antique [94]. Any [10]. Application [43]. Applications [17]. Architecture [106]. Argued [21]. Atkin [59]. Attack [56]. Attacks [32]. Authentication [2]. Aut...
متن کامل