Next:
Introduction
Up:
Secure Telnet
Previous:
Contents
List of Figures
The Network Virtual Terminal concept
Enabling an option
Sub-negotiation
Passive attack
Active attack
8 bit Cipher Feedback Mode
Authentication information exchange
Secure Telnet Environment
Typical PGP authentication procedure
Possible placements of the encryption/decryption module
Modified CFB mode
Example of a session with encryption
Data stream with integrity information
Placement of the integrity block
Asgaut Eng
Wed Apr 10 14:07:30 MET DST 1996