In December 1993, the experimental of IP Security swIPe (protocol) was researched at Columbia University and AT&T Bell Labs. In July 1994, Wei Xu at Trusted Information Systems continued this research. After several months, the research was completed successfully on BSDI system. By hacking the binary kernels, Wei had quickly extended his development on to Sun OS, HP UX, and other UNIX system. One of the challenges was slow performance of DES and 3DES. The software encryption can’t even support a T1 speed under the Intel 80386 architecture. By exploring the Crypto cards from Germany, Wei Xu further developed an automated device driver, known as plug-and-play today. By achieving the throughput for more than a T1s, this work made the commercial product practically feasible, that was released as a part of the well-known Gauntlet firewall. In December 1994, it was the first time in production for securing some of remote sites between east and west coastal states of the United States.
Another IP Security Protocol was developed in 1995 at the Naval Research Laboratory as part of a DARPA-sponsored research project. ESP was originally derived from the SP3D protocol, rather than being derived from the ISO Network-Layer Security Protocol (NLSP). The SP3D protocol specification was published by NIST, but designed by the Secure Data Network System project of the National Security Agency (NSA), AH is derived in part from previous IETF standards work for authentication of the Simple Network Management Protocol (SNMP).
Since 1996, the IP Security workshops were organized for standardizing the protocols. IPsec is officially specified by the Internet Engineering Task Force (IETF) in a series of Request for Comments documents addressing various components and extensions. It specifies the spelling of the protocol name to be IPsec.
|Routing protocols *|
|* Not a layer. A routing protocol belongs either to application or network layer.|
Read more about this topic: IPsec
Other articles related to "history":
... The breakup of Al-Andalus into the competing taifa kingdoms helped the long embattled Iberian Christian kingdoms gain the initiative ... The capture of the strategically central city of Toledo in 1085 marked a significant shift in the balance of power in favour of the Christian kingdoms ...
... The Skeptical School of early Chinese history, started by Gu Jiegang in the 1920s, was the first group of scholars within China to seriously question the traditional story of its ... early Chinese history is a tale told and retold for generations, during which new elements were added to the front end" ...
... The history of computing is longer than the history of computing hardware and modern computing technology and includes the history of methods intended for pen and paper or for chalk and ...
... in some form or another has been seen in almost every society in history ... From the Ancient Greeks and Romans to Napoleon's France and Elizabethan England, much of history is filled with stories of entertainment based on games of chance ... In American history, early gambling establishments were known as saloons ...
... History of Charles XII, King of Sweden (1731) The Age of Louis XIV (1751) The Age of Louis XV (1746–1752) Annals of the Empire – Charlemagne, A.D ... on the Manners of Nations (or 'Universal History') (1756) History of the Russian Empire Under Peter the Great (Vol ... II 1763) History of the Parliament of Paris (1769) ...
Famous quotes containing the word history:
“It is my conviction that women are the natural orators of the race.”
—Eliza Archard Connor, U.S. suffragist. As quoted in History of Woman Suffrage, vol. 4, ch. 9, by Susan B. Anthony and Ida Husted Harper (1902)
“When the history of this period is written, [William Jennings] Bryan will stand out as one of the most remarkable men of his generation and one of the biggest political men of our country.”
—William Howard Taft (18571930)
“We have need of history in its entirety, not to fall back into it, but to see if we can escape from it.”
—José Ortega Y Gasset (18831955)