[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Re[2]: Granularity of authentication in swIPe



Work that we are doing here uses crypto protocol layers.  Each
algorithm is wrapped in a protocol structure with optional hooks for
parsing headers and doing key lookups, etc.  These layers can be
combined into protocol graphs that provide complex services, such as
Kerberos or IPSP with DH key management.  The basic protocols come
in a small set of "shapes", and new algorithms can be added as protocol
layers with little difficulty.

Hilarie Orman


References: