Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

Theses and Dissertations

2005

Computer networks--Security measures

Articles 1 - 2 of 2

Full-Text Articles in Engineering

Enabling Intrusion Detection In Ipsec Protected Ipv6 Networks Through Secret-Key Sharing, Patrick J. Sweeney Mar 2005

Enabling Intrusion Detection In Ipsec Protected Ipv6 Networks Through Secret-Key Sharing, Patrick J. Sweeney

Theses and Dissertations

As the Internet Protocol version 6 (IPv6) implementation becomes more widespread, the IP Security (IPSec) features embedded into the next-generation protocol will become more accessible than ever. Though the network-layer encryption provided by IPSec is a boon to data security, its use renders standard network intrusion detection systems (NIDS) useless. The problem of performing intrusion detection on encrypted traffic has been addressed by differing means with each technique requiring one or more static secret keys to be shared with the NIDS beforehand. The problem with this approach is static keying is much less secure than dynamic key generation through the …


Simple Public Key Infrastructure Analysis Protocol Analysis And Design, Alexander G. Vidergar Mar 2005

Simple Public Key Infrastructure Analysis Protocol Analysis And Design, Alexander G. Vidergar

Theses and Dissertations

Secure electronic communication is based on secrecy, authentication and authorization. One means of assuring a communication has these properties is to use Public Key Cryptography (PKC). The framework consisting of standards, protocols and instructions that make PKC usable in communication applications is called a Public Key Infrastructure (PKI). This thesis aims at proving the applicability of the Simple Public Key Infrastructure (SPKI) as a means of PKC. The strand space approach of Guttman and Thayer is used to provide an appropriate model for analysis. A Diffie-Hellman strand space model is combined with mixed strand space proof methods for proving the …