20.01.2014 Views

Lectures notes for 2010 - KTH

Lectures notes for 2010 - KTH

Lectures notes for 2010 - KTH

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Security<br />

• Header Authentication with signatures<br />

• Must have support <strong>for</strong> Message Digest 5 (MD5) algorithm [11]<br />

• RFC 1810 [12] examines MD5 per<strong>for</strong>mance<br />

• Packet Encapsulation with e.g., DES<br />

For more in<strong>for</strong>mation see Chapter 5 of IPv6, 2nd edition, by Christian Huitema.<br />

Maguire Security 10: 35 of 54<br />

maguire@kth.se <strong>2010</strong>.03.21 Internetworking/Internetteknik

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!