Next:
List of Figures
Up:
Secure Telnet
Previous:
Secure Telnet
Contents
List of Figures
Introduction
Background
The Telnet Protocol
The Network Virtual Terminal
The Principle of Negotiated Options
Documenting Telnet options
Examples of option code negotiations
Passive attacks
Active attacks
IDEA
Block cipher modes
Electronic codebook mode
Cipher block chaining
Cipher feedback mode
RSA
Description of the RSA algorithm
Cryptographic hash functions
PGP
Basic principles of operation
The Web of Trust
Multi-precision integers
Generation of random numbers
Introduction
Fundamental information theory
Recommended random number sources
RFC 1416 - Telnet authentication option
Definitions
Use of the option
Proposed design
Environment model
Security policy
Authentication option
Why use PGP?
Design goals
PGP authentication scheme
Authentication information
Format of the ``challenge''
Selecting encryption keys
Command name and codes
Sub-option command meanings
Example
Encryption option
Design goals
Placement in the protocol model
Selecting an encryption algorithm
Modified CFB mode
Command name and codes
Command meanings and usage
Example
Integrity option
Design goals
The integrity information
Placement in the protocol model
Generating the integrity information
Integrity type: 32-bit CRC and IDEA in modified CFB mode
Command name and codes
Command meanings and usage
Implementation rules
The test implementation
The framework
The PGP authentication implementation
Testing
Discussion and recommendations
Authentication option
Key management
Session key exchange
Security considerations
Encryption option
Security considerations
Integrity option
System complexity issues
Conclusion
Authentication draft
References
About this document ...
Asgaut Eng
Wed Apr 10 14:07:30 MET DST 1996