IPsec - History

History

In December 1993, the experimental of IP Security swIPe (protocol) was researched at Columbia University and AT&T Bell Labs. In July 1994, Wei Xu at Trusted Information Systems continued this research. After several months, the research was completed successfully on BSDI system. By hacking the binary kernels, Wei had quickly extended his development on to Sun OS, HP UX, and other UNIX system. One of the challenges was slow performance of DES and 3DES. The software encryption can’t even support a T1 speed under the Intel 80386 architecture. By exploring the Crypto cards from Germany, Wei Xu further developed an automated device driver, known as plug-and-play today. By achieving the throughput for more than a T1s, this work made the commercial product practically feasible, that was released as a part of the well-known Gauntlet firewall. In December 1994, it was the first time in production for securing some of remote sites between east and west coastal states of the United States.

Another IP Security Protocol was developed in 1995 at the Naval Research Laboratory as part of a DARPA-sponsored research project. ESP was originally derived from the SP3D protocol, rather than being derived from the ISO Network-Layer Security Protocol (NLSP). The SP3D protocol specification was published by NIST, but designed by the Secure Data Network System project of the National Security Agency (NSA), AH is derived in part from previous IETF standards work for authentication of the Simple Network Management Protocol (SNMP).

Since 1996, the IP Security workshops were organized for standardizing the protocols. IPsec is officially specified by the Internet Engineering Task Force (IETF) in a series of Request for Comments documents addressing various components and extensions. It specifies the spelling of the protocol name to be IPsec.

Internet protocols
Application layer
  • DHCP
  • DHCPv6
  • DNS
  • FTP
  • HTTP
  • IMAP
  • IRC
  • LDAP
  • MGCP
  • NNTP
  • NTP
  • POP
  • RPC
  • RTP
  • RTSP
  • SIP
  • SMTP
  • SNMP
  • SOCKS
  • SSH
  • Telnet
  • TLS/SSL
  • XMPP
  • (more)
Transport layer
  • TCP
  • UDP
  • DCCP
  • SCTP
  • RSVP
  • (more)
Routing protocols *
  • BGP
  • OSPF
  • RIP
  • (more)
Internet layer
  • IP
    • IPv4
    • IPv6
  • ICMP
  • ICMPv6
  • ECN
  • IGMP
  • IPsec
  • (more)
Link layer
  • ARP/InARP
  • NDP
  • Tunnels
    • L2TP
  • PPP
  • Media access control
    • Ethernet
    • DSL
    • ISDN
    • FDDI
  • (more)
* Not a layer. A routing protocol belongs either to application or network layer.

Read more about this topic:  IPsec

Other articles related to "history":

Spain - History - Fall of Muslim Rule and Unification
... The breakup of Al-Andalus into the competing taifa kingdoms helped the long embattled Iberian Christian kingdoms gain the initiative ... The capture of the strategically central city of Toledo in 1085 marked a significant shift in the balance of power in favour of the Christian kingdoms ...
Xia Dynasty - Modern Skepticism
... The Skeptical School of early Chinese history, started by Gu Jiegang in the 1920s, was the first group of scholars within China to seriously question the traditional story of its ... early Chinese history is a tale told and retold for generations, during which new elements were added to the front end" ...
Voltaire - Works - Historical
... History of Charles XII, King of Sweden (1731) The Age of Louis XIV (1751) The Age of Louis XV (1746–1752) Annals of the Empire – Charlemagne, A.D ... on the Manners of Nations (or 'Universal History') (1756) History of the Russian Empire Under Peter the Great (Vol ... II 1763) History of the Parliament of Paris (1769) ...
Casino - History of Gambling Houses
... believed that gambling in some form or another has been seen in almost every society in history ... Napoleon's France and Elizabethan England, much of history is filled with stories of entertainment based on games of chance ... In American history, early gambling establishments were known as saloons ...
History of Computing
... The history of computing is longer than the history of computing hardware and modern computing technology and includes the history of methods intended for pen and paper or for chalk and ...

Famous quotes containing the word history:

    So in accepting the leading of the sentiments, it is not what we believe concerning the immortality of the soul, or the like, but the universal impulse to believe, that is the material circumstance, and is the principal fact in this history of the globe.
    Ralph Waldo Emerson (1803–1882)

    The history of work has been, in part, the history of the worker’s body. Production depended on what the body could accomplish with strength and skill. Techniques that improve output have been driven by a general desire to decrease the pain of labor as well as by employers’ intentions to escape dependency upon that knowledge which only the sentient laboring body could provide.
    Shoshana Zuboff (b. 1951)

    To summarize the contentions of this paper then. Firstly, the phrase ‘the meaning of a word’ is a spurious phrase. Secondly and consequently, a re-examination is needed of phrases like the two which I discuss, ‘being a part of the meaning of’ and ‘having the same meaning.’ On these matters, dogmatists require prodding: although history indeed suggests that it may sometimes be better to let sleeping dogmatists lie.
    —J.L. (John Langshaw)