Engineering Trade-offs in Authentication Protocols

1/15/02


Click here to start


Table of Contents

Engineering Trade-offs in Authentication Protocols

Areas Where Proposals Differ

Performance

Performance Comparison (messages)

Celeron 300 Time Estimates (ms) (thanks to EKR)

Stateless Cookie

Stateless Cookie

Identity Hiding

Identity Hiding

Comparing Protocols

Dead Peer Detection

How to detect a dead peer

Plausible Deniability

Negotiating Parameters

How to Negotiate Parameters

What Parameters does IKEv1 Negotiate?

How Do Proposals Differ on Parameters

Different Kinds of Credentials (usually noninteroperable)

Other Differences

Author: Charlie Kaufman