Map
Index
Random
Help
th

Quote: Andrew's authentication procedure depends on a shared, encrypted handshake key; randomized to prevent replay attacks

topics > all references > references sa-sz > QuoteRef: satyM8_1989 , p. 256



Topic:
security leaks and weaknesses
Topic:
authentication

Quotation Skeleton

The correctness of [Vice's BIND] authentication procedure hinges on … [8-byte encryption key] by both [the client and the server] is essential for all steps of the … able to generate outgoing messages that correspond to … server are required to demonstrate that they possess … [and the initial sequence number, ensure that packets can't be replayed].   Google-1   Google-2

Copyright clearance needed for quotation.


Related Topics up

Topic: security leaks and weaknesses (56 items)
Topic: authentication (87 items)

Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.