Gerdes et al., 2022 - Google Patents
RFC 9202: Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE)Gerdes et al., 2022
View PDF- Document ID
- 2598889031600416825
- Author
- Gerdes S
- Bergmann O
- Bormann C
- Selander G
- Seitz L
- Publication year
External Links
Snippet
This specification defines a profile of the Authentication and Authorization for Constrained Environments (ACE) framework that allows constrained servers to delegate client authentication and authorization. The protocol relies on DTLS version 1.2 or later for …
- 239000000463 material 0 description 33
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Seitz et al. | RFC 9200: Authentication and Authorization for Constrained Environments Using the OAuth 2.0 Framework (ACE-OAuth) | |
US11902445B2 (en) | System and method for enabling secure service-based communications via 5G proxies | |
Hickman et al. | The SSL protocol | |
US10270601B2 (en) | Providing forward secrecy in a terminating SSL/TLS connection proxy using ephemeral Diffie-Hellman key exchange | |
US8059818B2 (en) | Accessing protected data on network storage from multiple devices | |
US9571458B1 (en) | Anti-replay mechanism for group virtual private networks | |
US7424615B1 (en) | Mutually authenticated secure key exchange (MASKE) | |
JP2021500832A5 (en) | ||
Gerdes et al. | Datagram transport layer security (dtls) profile for authentication and authorization for constrained environments (ace) | |
US11968302B1 (en) | Method and system for pre-shared key (PSK) based secure communications with domain name system (DNS) authenticator | |
Kinnear et al. | Oblivious dns over https | |
US20080137859A1 (en) | Public key passing | |
JP2018117340A (en) | User authentication in computer network | |
US12015721B1 (en) | System and method for dynamic retrieval of certificates with remote lifecycle management | |
Yerlikaya et al. | Authentication and authorization mechanism on message queue telemetry transport protocol | |
Fotiou et al. | Securing information-centric networking without negating middleboxes | |
Mosko et al. | Mobile sessions in content-centric networks | |
CN110832806B (en) | ID-based data plane security for identity-oriented networks | |
Hall-Andersen et al. | nQUIC: Noise-based QUIC packet protection | |
Barker et al. | Sp 800-57. recommendation for key management, part 1: General (revised) | |
Gerdes et al. | RFC 9202: Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE) | |
Cisco | Configuring IPSec | |
Pittoli et al. | Security architectures in constrained environments: A survey | |
Kinnear et al. | RFC 9230: Oblivious DNS over HTTPS | |
Faisal et al. | Graphene: a secure cloud communication architecture |