2007 IEEE Symposium on Security and Privacy (SP '07) 2007
DOI: 10.1109/sp.2007.8
|View full text |Cite
|
Sign up to set email alerts
|

Attacking the IPsec Standards in Encryption-only Configurations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
44
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 37 publications
(44 citation statements)
references
References 8 publications
0
44
0
Order By: Relevance
“…If confidentiality is not needed, providing authentication can still be useful. Confidentiality without authentication is not effective [DP07] and therefore SHOULD NOT be used. We describe each of these cases in more detail below.…”
Section: Summary Of Changes From Rfc 4835mentioning
confidence: 99%
“…If confidentiality is not needed, providing authentication can still be useful. Confidentiality without authentication is not effective [DP07] and therefore SHOULD NOT be used. We describe each of these cases in more detail below.…”
Section: Summary Of Changes From Rfc 4835mentioning
confidence: 99%
“…During the 10-15 years since the protocols of Section 2 largely took their present form, a large number number of security proofs, counter-proofs and attacks have been presented, starting with [38][39][40] and [23,[41][42][43][44] representing some of the more recent work.…”
Section: Rethinking Privacy and Authenticationmentioning
confidence: 99%
“…Their attacks work if an implementation does not follow the standard strictly. Later, Degabriele and Paterson [20] published another attack that works only if an implementation strictly follows the standard.…”
Section: Related Workmentioning
confidence: 99%