4. Checksum Algorithm Profile................. 9

نویسنده

  • K. Raeburn
چکیده

This document describes a framework for defining encryption and checksum mechanisms for use with the Kerberos protocol, defining an abstraction layer between the Kerberos protocol and related protocols, and the actual mechanisms themselves. The document also defines several mechanisms. Some are taken from RFC 1510, modified in form to fit this new framework and occasionally modified in content when the old specification was incorrect. New mechanisms are presented here as well. This document does NOT indicate which mechanisms may be considered "required to implement".

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Limited-Global-Informatin-Based Multicasting Scheme for Faulty Hypercubes

One important performance measure of CED designs is how quickly the error can be detected. The input checksum of a set of input data Can be computed while they propagate through the network. ne time for calculating the output checksum, however, should [9] P.D. Welch, “A fixed-point fast Fourier transform error analysis,” IEEE Truns. Audio Electroacoustics, vol. 17, pp. 151-157, June 1969. [IO] ...

متن کامل

RFC 4757 RC 4 - HMAC December 2006

The Microsoft Windows 2000 implementation of Kerberos introduces a new encryption type based on the RC4 encryption algorithm and using an MD5 HMAC for checksum. This is offered as an alternative to using the existing DES-based encryption types. The RC4-HMAC encryption types are used to ease upgrade of existing Windows NT environments, provide strong cryptography (128-bit key lengths), and provi...

متن کامل

INTERNET - DRAFT ZLIB Compressed Data Format

This specification defines a lossless compressed data format. The data can be produced or consumed, even for an arbitrarily long sequentially presented input data stream, using only an a priori bounded amount of intermediate storage. The format presently uses the DEFLATE compression method but can be easily extended to use other compression methods. It can be implemented readily in a manner not...

متن کامل

ZLIB Compressed Data Format Specification

This specification defines a lossless compressed data format. The data can be produced or consumed, even for an arbitrarily long sequentially presented input data stream, using only an a priori bounded amount of intermediate storage. The format presently uses the DEFLATE compression method but can be easily extended to use other compression methods. It can be implemented readily in a manner not...

متن کامل

A Bibliography of Papers in Lecture Notes in Computer Science (1990)

10]. Abuse [75]. Abuse-Free [75]. Access [64]. Active [32]. Addition [110]. Adolescence [1]. Age [61]. Agent [125]. Algebraic [63]. Algebraic-Code [63]. Algorithm [88]. Algorithms [13]. Alive [6]. Almost [60]. Alternative [19]. and/or [44]. Antique [94]. Any [10]. Application [43]. Applications [17]. Architecture [106]. Argued [21]. Atkin [59]. Attack [56]. Attacks [32]. Authentication [2]. Aut...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005