Next:
Environment model
Up:
Secure Telnet
Previous:
Use of the option
Proposed design
Environment model
Security policy
Authentication option
Why use PGP?
Design goals
PGP authentication scheme
Authentication information
Format of the ``challenge''
Selecting encryption keys
Command name and codes
Sub-option command meanings
Example
Encryption option
Design goals
Placement in the protocol model
Selecting an encryption algorithm
Modified CFB mode
Command name and codes
Command meanings and usage
Example
Integrity option
Design goals
The integrity information
Placement in the protocol model
Generating the integrity information
Integrity type: 32-bit CRC and IDEA in modified CFB mode
Command name and codes
Command meanings and usage
Implementation rules
The test implementation
The framework
The PGP authentication implementation
Testing
Asgaut Eng
Wed Apr 10 14:07:30 MET DST 1996