Crypto for Network Protocols

CS 463 Lecture, Dr. Lawlor

Purpose
Insecure
Secure
Built on
Popularity
Web
http
https
TLS/SSL, X.509 PKI
Common
Files
ftp / nfs
scp
rsa, aes-128-ctr
Common
Shell
telnet / rsh
ssh
same
Common
Domain names
DNS
DNSSEC
hash+signature
Coming soon
Single sign on
LDAP (v2)
Kerberos
central server
Declining
Basic connectivity
IP
IPsec
IKE
Coming soon

A disturbing number of commonly used network protocols use exactly zero crypto.  This makes them susceptible to both information leakage and a variety of man in the middle attacks.