IPsec - History

History

In December 1993, the experimental of IP Security swIPe (protocol) was researched at Columbia University and AT&T Bell Labs. In July 1994, Wei Xu at Trusted Information Systems continued this research. After several months, the research was completed successfully on BSDI system. By hacking the binary kernels, Wei had quickly extended his development on to Sun OS, HP UX, and other UNIX system. One of the challenges was slow performance of DES and 3DES. The software encryption can’t even support a T1 speed under the Intel 80386 architecture. By exploring the Crypto cards from Germany, Wei Xu further developed an automated device driver, known as plug-and-play today. By achieving the throughput for more than a T1s, this work made the commercial product practically feasible, that was released as a part of the well-known Gauntlet firewall. In December 1994, it was the first time in production for securing some of remote sites between east and west coastal states of the United States.

Another IP Security Protocol was developed in 1995 at the Naval Research Laboratory as part of a DARPA-sponsored research project. ESP was originally derived from the SP3D protocol, rather than being derived from the ISO Network-Layer Security Protocol (NLSP). The SP3D protocol specification was published by NIST, but designed by the Secure Data Network System project of the National Security Agency (NSA), AH is derived in part from previous IETF standards work for authentication of the Simple Network Management Protocol (SNMP).

Since 1996, the IP Security workshops were organized for standardizing the protocols. IPsec is officially specified by the Internet Engineering Task Force (IETF) in a series of Request for Comments documents addressing various components and extensions. It specifies the spelling of the protocol name to be IPsec.

Internet protocols
Application layer
  • DHCP
  • DHCPv6
  • DNS
  • FTP
  • HTTP
  • IMAP
  • IRC
  • LDAP
  • MGCP
  • NNTP
  • NTP
  • POP
  • RPC
  • RTP
  • RTSP
  • SIP
  • SMTP
  • SNMP
  • SOCKS
  • SSH
  • Telnet
  • TLS/SSL
  • XMPP
  • (more)
Transport layer
  • TCP
  • UDP
  • DCCP
  • SCTP
  • RSVP
  • (more)
Routing protocols *
  • BGP
  • OSPF
  • RIP
  • (more)
Internet layer
  • IP
    • IPv4
    • IPv6
  • ICMP
  • ICMPv6
  • ECN
  • IGMP
  • IPsec
  • (more)
Link layer
  • ARP/InARP
  • NDP
  • Tunnels
    • L2TP
  • PPP
  • Media access control
    • Ethernet
    • DSL
    • ISDN
    • FDDI
  • (more)
* Not a layer. A routing protocol belongs either to application or network layer.

Read more about this topic:  IPsec

Other articles related to "history":

Voltaire - Works - Historical
... History of Charles XII, King of Sweden (1731) The Age of Louis XIV (1751) The Age of Louis XV (1746–1752) Annals of the Empire – Charlemagne, A.D ... on the Manners of Nations (or 'Universal History') (1756) History of the Russian Empire Under Peter the Great (Vol ... II 1763) History of the Parliament of Paris (1769) ...
Casino - History of Gambling Houses
... believed that gambling in some form or another has been seen in almost every society in history ... France and Elizabethan England, much of history is filled with stories of entertainment based on games of chance ... In American history, early gambling establishments were known as saloons ...
History of Computing
... The history of computing is longer than the history of computing hardware and modern computing technology and includes the history of methods intended for pen and paper or for chalk ...
Spain - History - Fall of Muslim Rule and Unification
... The breakup of Al-Andalus into the competing taifa kingdoms helped the long embattled Iberian Christian kingdoms gain the initiative ... The capture of the strategically central city of Toledo in 1085 marked a significant shift in the balance of power in favour of the Christian kingdoms ...
Xia Dynasty - Modern Skepticism
... The Skeptical School of early Chinese history, started by Gu Jiegang in the 1920s, was the first group of scholars within China to seriously question the traditional story of its early history "the later the time ... early Chinese history is a tale told and retold for generations, during which new elements were added to the front end" ...

Famous quotes containing the word history:

    As History stands, it is a sort of Chinese Play, without end and without lesson.
    Henry Brooks Adams (1838–1918)

    We are told that men protect us; that they are generous, even chivalric in their protection. Gentlemen, if your protectors were women, and they took all your property and your children, and paid you half as much for your work, though as well or better done than your own, would you think much of the chivalry which permitted you to sit in street-cars and picked up your pocket- handkerchief?
    Mary B. Clay, U.S. suffragist. As quoted in History of Woman Suffrage, vol. 4, ch. 3, by Susan B. Anthony and Ida Husted Harper (1902)

    There is no history of how bad became better.
    Henry David Thoreau (1817–1862)