[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Gerdes et al., 2022 - Google Patents

RFC 9202: Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE)

Gerdes et al., 2022

View PDF
Document ID
2598889031600416825
Author
Gerdes S
Bergmann O
Bormann C
Selander G
Seitz L
Publication year

External Links

Snippet

This specification defines a profile of the Authentication and Authorization for Constrained Environments (ACE) framework that allows constrained servers to delegate client authentication and authorization. The protocol relies on DTLS version 1.2 or later for …
Continue reading at www.hjp.at (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys

Similar Documents

Publication Publication Date Title
Seitz et al. RFC 9200: Authentication and Authorization for Constrained Environments Using the OAuth 2.0 Framework (ACE-OAuth)
US11902445B2 (en) System and method for enabling secure service-based communications via 5G proxies
Hickman et al. The SSL protocol
US10270601B2 (en) Providing forward secrecy in a terminating SSL/TLS connection proxy using ephemeral Diffie-Hellman key exchange
US8059818B2 (en) Accessing protected data on network storage from multiple devices
US9571458B1 (en) Anti-replay mechanism for group virtual private networks
US7424615B1 (en) Mutually authenticated secure key exchange (MASKE)
JP2021500832A5 (en)
Gerdes et al. Datagram transport layer security (dtls) profile for authentication and authorization for constrained environments (ace)
US11968302B1 (en) Method and system for pre-shared key (PSK) based secure communications with domain name system (DNS) authenticator
Kinnear et al. Oblivious dns over https
US20080137859A1 (en) Public key passing
JP2018117340A (en) User authentication in computer network
US12015721B1 (en) System and method for dynamic retrieval of certificates with remote lifecycle management
Yerlikaya et al. Authentication and authorization mechanism on message queue telemetry transport protocol
Fotiou et al. Securing information-centric networking without negating middleboxes
Mosko et al. Mobile sessions in content-centric networks
CN110832806B (en) ID-based data plane security for identity-oriented networks
Hall-Andersen et al. nQUIC: Noise-based QUIC packet protection
Barker et al. Sp 800-57. recommendation for key management, part 1: General (revised)
Gerdes et al. RFC 9202: Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE)
Cisco Configuring IPSec
Pittoli et al. Security architectures in constrained environments: A survey
Kinnear et al. RFC 9230: Oblivious DNS over HTTPS
Faisal et al. Graphene: a secure cloud communication architecture