20.01.2014 Views

Lectures notes for 2010 - KTH

Lectures notes for 2010 - KTH

Lectures notes for 2010 - KTH

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

AH header<br />

For authentication purposes only contains:<br />

• an SPI,<br />

• a sequence number, and<br />

• an authentication value.<br />

AH uses either:<br />

• Message Digest 5 (MD5) algorithm,<br />

• Secure Hash Algorithm 1 (SHA-1),<br />

• truncated HMAC (hashed message authentication code), or<br />

• …<br />

For further in<strong>for</strong>mation see:<br />

• IP Authentication Header - RFC 2402 [3]<br />

Maguire AH header 12: 9 of 30<br />

maguire@kth.se <strong>2010</strong>.03.21 Internetworking/Internetteknik

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!