Table of Contents

1. Introduction
2. IPSEC

2.1 Authentication & Integrity
2.2 Confidentiality
2.3 Security Association and Encryption Strength
2.3.1 Security Association
2.3.2 Encryption strength - algorithms
2.4 Key Distribution
3. TCM projects
3.1 General
3.2 Solaris 2.5 STREAMS Implementation
3.2.1 Implementation
3.2.2 Results and performance
3.3 More on STREAMS implementation
3.4 Conduits+ and Java Implementation
3.4.1 Conduits+ framework
3.4.2 Java as the implementation language
3.4.3 Implementation
3.4.4 Results and performance
3.5 SecOT - IPSec-on-Macintosh
3.5.1 Open Transport
3.5.2 Implementation
4. Links


Marcin Dobrucki, 1997