Skip to main content

On the development of a security toolkit for open networks - New security features in SECUDE

  • Chapter
Verläßliche IT-Systeme

Part of the book series: DUD-Fachbeiträge ((DUD))

  • 63 Accesses

Abstract

In this article we will discuss the requirements of security toolkits for open networks, explain some important technical details and give a perspective on modern security technology. To illustrate these issues we will focus on the current and future development of SECUDE. We will give a brief overview of the SECUDE [16] structure, emphasize the latest developments and new security APIs, such as improvements in the CRYPT-API, the integration of new smartcards, the Directory access via LDAP, the support of X.509v3 certificates and new security features like GSSv2, PKCS#7,10, S/MEME, BAKO and SURE.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
eBook
USD 54.99
Price excludes VAT (USA)
Softcover Book
USD 69.99
Price excludes VAT (USA)

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. S. Kolletzki: „Secure Internet Banking with Privacy Enhanced Mail“, Computer Networks and ISDN Systems 28 (1996) 1891–1899

    Article  Google Scholar 

  2. H. Dobbertin: „Welche Hash-Funktionen sind fur digitale Signaturen geeignet?“, Tagungsband „Digitale Signaturen“, Vieweg-Verlag, 1996, ISBN 3–528-05548–0, pp. 81–92

    Google Scholar 

  3. H. Dobbertin: „Digitale Fingerabdrücke - Sichere Hashfunktionen für digitale Signaturen“, DuD 2/97, Vieweg, pp. 82–87, 1997

    Google Scholar 

  4. J. Linn: „GSS API“ RFCs 1508 and 1509 (C-bindings), Sep. 93

    Google Scholar 

  5. J. Linn: „The GSS API Version 2“ RFC 2078, Jan 97

    Google Scholar 

  6. C. Adams: „The Simple Public-Key GSS-API Mechanism (SPKM)“, RFC 2025, Jan 96

    Google Scholar 

  7. J. Kohl, C. Neumann: “The Kerberos Network Authentication Sendee (V5)” RFC 1510, Sep. 1993

    Google Scholar 

  8. J. Linn: “The Kerberos Version 5 GSS-API Mechanism”, RFC 1964, Juni 1996

    Google Scholar 

  9. D. Hühnlein: “Generische Sicherheit - Die GSS-API und drei ihrer Mechanismen”, to appear in FIFF-communication, 3/97

    Google Scholar 

  10. University of Michigan Information Technology Division: „LDAP servers, client library and sample text based UNIX clients“ ftp://terminators.itd.umich.edu/x500/ldap/ldap-3.3.tar.Z „Windows Binary Distribution (contains LDAP32.DLL, LEB and header files)" ftp://terminator.rs.itd.umich.edu/x500/ldap/windows

  11. J. Linn: „Message Encryption and Authent. Procedures“ RFC 1421, Feb 93 S.

    Google Scholar 

  12. Kent: „Certificate Based Key Management“ RFC 1422, Feb 93

    Google Scholar 

  13. D. Balenson: „Algorithms modes and identifiers“ RFC 1423, Feb 93

    Google Scholar 

  14. B. Kaliski: „Key Certification and related Services“ RFC 1424, Feb 93

    Google Scholar 

  15. RSA: „PKCS#1-#11: Public Key Cryptography Standards“, http://www.rsa.com, revised Nov. 1993

    Google Scholar 

  16. M. Wahl, T. Howes, S. Killie: „Lightweight Directory Access Protocol (v3) “, 10/1996 ftp://ds.internic.net/internet-drafts/draft-ietf-asid-ldapv3-protocol-03.txt

    Google Scholar 

  17. W. Yeong, T. Howes, S. Killie: „CURRENT LDAP Version2“, March 1995 ftp://ds.internic.net/rfc/rfcl.777.txt

  18. H. Dobbertin, A. Bosselaers, B. Preneel: „RTPEMD-160: A strengthened version of RIPEMD“, Fast Software Encryption, Cambridge Workshop, LNCS 1039, Springer, 1996, pp. 53–69, corrected version via ftp://esat.kuleuven.ac.be/pub/COSIC/bosselae/ripemd/

    Chapter  Google Scholar 

  19. B. Schneier: “Applied Cryptography - Protocols, Algorithms and Source Code in C”, John Wiley & Sons, New York, 1994, ISBN 0–471-59756–2

    Google Scholar 

  20. GMD: „SECUDE 5.0 - Hyperlink Documentation“, 1996, http://www.darmstadt.gmd.de/secude/doc/index.htm

    Google Scholar 

  21. RSA: „S/MIME Message Specification“, Feb 96, smime-editor@rsa.com.

    Google Scholar 

  22. P. Glöckner, S. Kolletzki, M. Wiehert: „Signed Unique References“, to appear in the proceedings of JENC8

    Google Scholar 

  23. F. Bauspieß (ed.): „MailTrusT Spezifikation, Version 1.1“, 12/96

    Google Scholar 

  24. ISO/EEC JTC 1/SC 21/WG 4 and ITU-T Q15/7: „Final Text of Draft Amendment 1 to ISO/IEC 9594–8 on Certificate Extensions“, December 1996

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Günter Müller Kai Rannenberg Manfred Reitenspieß Helmut Stiegler

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Friedr. Vieweg & Sohn Verlagsgesellschaft mbH, Braunschweig/Wiesbaden

About this chapter

Cite this chapter

Faltin, U. et al. (1997). On the development of a security toolkit for open networks - New security features in SECUDE. In: Müller, G., Rannenberg, K., Reitenspieß, M., Stiegler, H. (eds) Verläßliche IT-Systeme. DUD-Fachbeiträge. Vieweg+Teubner Verlag. https://doi.org/10.1007/978-3-322-86842-8_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-322-86842-8_8

  • Publisher Name: Vieweg+Teubner Verlag

  • Print ISBN: 978-3-528-05594-3

  • Online ISBN: 978-3-322-86842-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics