Check out the new USENIX Web site. next up previous
Next: Paper Organization Up: Implementing Internet Key Exchange Previous: Abstract

Introduction

  The IP Security architecture [14], as specified by the IETF (Internet Engineering Task Force), is comprised of a set of protocols that provide data integrity, confidentiality, replay protection, and authentication at the network layer. This positioning in the network stack offers considerable flexibility in transparently employing IPsec in different roles (e.g., in building Virtual Private Networks, end-to-end security, remote access, etc.). Such flexibility is not possible in higher or lower levels of abstraction.

The overall IPsec architecture is very similar to previous work [12] and is composed of three modules:



 
next up previous
Next: Paper Organization Up: Implementing Internet Key Exchange Previous: Abstract
Angelos D. Keromytis
4/20/2000