The Use of RSA/SHA-1 Signatures within Encapsulating Security Payload (ESP) and Authentication Header (AH).
Brian WeisPublished in: RFC (2006)
Keyphrases
- public key cryptography
- digital signature
- private key
- elliptic curve cryptography
- public key
- signature scheme
- security mechanisms
- security analysis
- elliptic curve
- public key infrastructure
- identity authentication
- security requirements
- authentication protocol
- authentication scheme
- digital signature scheme
- cryptographic algorithms
- smart card
- key exchange
- security model
- hash functions
- key distribution
- security issues
- user authentication
- high security
- fuzzy vault
- factor authentication
- access control
- authentication mechanism
- diffie hellman
- signature verification
- data encryption
- encryption decryption
- secure communication
- modular exponentiation
- authentication systems
- trusted third party
- provably secure
- bilinear pairings
- security systems
- key agreement
- integrity verification
- key management
- security services
- data integrity
- identity management
- virtual private network
- image authentication
- encryption scheme
- network traffic
- mutual authentication
- digital watermarking
- information security
- intrusion detection
- security protocols
- secret key
- security policies
- network security
- resource constrained
- biometric data
- public key cryptosystems