1998
DOI: 10.17487/rfc2406
|View full text |Cite
|
Sign up to set email alerts
|

IP Encapsulating Security Payload (ESP)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
194
0
4

Year Published

2002
2002
2009
2009

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 372 publications
(198 citation statements)
references
References 4 publications
0
194
0
4
Order By: Relevance
“…Both the mobile nodes and the home agents MUST support and SHOULD use the Encapsulating Security Payload (ESP) [6] header in transport mode and MUST use a non-NULL payload authentication algorithm to provide data origin authentication, connectionless integrity and optional anti-replay protection. Note that Authentication Header (AH) [5] is also possible but for brevity not discussed in this specification.…”
Section: Binding Updates To Home Agentsmentioning
confidence: 99%
See 2 more Smart Citations
“…Both the mobile nodes and the home agents MUST support and SHOULD use the Encapsulating Security Payload (ESP) [6] header in transport mode and MUST use a non-NULL payload authentication algorithm to provide data origin authentication, connectionless integrity and optional anti-replay protection. Note that Authentication Header (AH) [5] is also possible but for brevity not discussed in this specification.…”
Section: Binding Updates To Home Agentsmentioning
confidence: 99%
“…The type 2 routing header has the following format: In addition, the general procedures defined by IPv6 for routing headers suggest that a received routing header MAY be automatically "reversed" to construct a routing header for use in any response packets sent by upper-layer protocols, if the received packet is authenticated [6]. This MUST NOT be done automatically for type 2 routing headers.…”
Section: Formatmentioning
confidence: 99%
See 1 more Smart Citation
“…In this case application level encryption is not sufficient; IPSEC ESP [24] SHOULD be used instead. Regardless of which level performs the encryption, the IPSEC ISAKMP [25] service SHOULD be used for key management.…”
Section: Protecting Confidentialitymentioning
confidence: 99%
“…IPsec is the current security standard for the Internet Protocol IP [4][5][6]8,9]. According to this standard, a selected computer pair (p, q) in the Internet has to establish a unidirectional "security association", or SA for short, before computer p can start sending messages to computer q.…”
Section: Introductionmentioning
confidence: 99%