5 . 5 . 3 Secret Key Packet Formats 5 . 6 Compressed Data Packet ( Tag 8 ) 5 . 7

نویسندگان

  • Jon Callas
  • Lutz Donnerhacke
  • Hal Finney
  • Rodney Thayer
چکیده

This document is maintained in order to publish all necessary information needed to develop interoperable applications based on the OP format. It is not a step-by-step cookbook for writing an application, it describes only the format and methods needed to read, check, generate and write conforming packets crossing any network. It does not deal with storing and implementation questions albeit it is necessary to avoid security flaws. OP (Open-PGP) software uses a combination of strong public-key and conventional cryptography to provide security services for electronic communications and data storage. These services include confidentiality, key management, authentication and digital signatures. This document specifies the message formats used in OP. Callas, et. al. Expires May 1998 [Page 1] Internet Draft OpenPGP Message Format Nov 1998 Table of

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

5 . 6 Compressed Data Packet ( Tag 8 ) 5 . 7 Symmetrically Encrypted Data Packet ( Tag 9 ) 5 . 8 Marker Packet

This document is maintained in order to publish all necessary information needed to develop interoperable applications based on the OP format. It is not a step-by-step cookbook for writing an application, it describes only the format and methods needed to read, check, generate and write conforming packets crossing any network. It does not deal with storing and implementation questions albeit it...

متن کامل

Circuit Emulation over Packet Switched Networks (CESoP) - White Paper

.......................................................................................................................... 2 Carrying TDM Services over a Packet Network .............................................................. 2 An Evolutionary Approach ........................................................................................... 3 Standards .....................................

متن کامل

Lifespan Enhanced Energy Efficient Cluster Formation and Trusted Multipath Data Transmission for Packet Forwarding in Wireless Sensor Network

Due to unwant overhead in security process of WSNs, the time consumption of each node is very high from authentication, key generation and key distribution phases and hence every data packet experiences the same latency. The efficiency of exchanging the secret key degrades rapidly as a function of external signal interference power and limits its resilience against active attackers. Increases t...

متن کامل

IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks

Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...

متن کامل

Structured Stream Transport Preliminary Protocol Specification

3 Channel Protocol 5 3.1 Protocol Organization . . . . . . . . . . . 5 3.2 Packet Layout . . . . . . . . . . . . . . . 5 3.3 Channel Identification . . . . . . . . . . . 6 3.4 Sequencing Layer . . . . . . . . . . . . . 6 3.4.1 Sequencing Barriers . . . . . . . 6 3.4.2 Extrapolating Sequence Numbers 6 3.5 Encoding Layer . . . . . . . . . . . . . . 7 3.6 Integrity Layer . . . . . . . . . . . . . ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998