SharkNet : Cooperation with service providers outside the secure infrastructure

This master thesis presents how the authentication is handled in two frequently used protocols. It is a study of the authentication procedure in IPsec and TLS where the techniques have been compared based on facts from literature and practical tests. The results in this thesis are to be used as part...

Full description

Bibliographic Details
Main Author: Normark, Vendela
Format: Others
Language:English
Published: Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap 2003
Subjects:
TLS
Online Access:http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3895
Description
Summary:This master thesis presents how the authentication is handled in two frequently used protocols. It is a study of the authentication procedure in IPsec and TLS where the techniques have been compared based on facts from literature and practical tests. The results in this thesis are to be used as part arguments for continuous development of cooperation between operators using Ericsson´s charging system and content providers. === I detta magisterarbete beskrivs hur autentisering går till i två vanligt förekommande protokoll. Det är en undersökning av autentiseringen i IPsec och TLS där teknikerna har jämförts utifrån litterära studier och praktiska tester. Resultaten i arbetet ska användas som delargument i den fortsatta utvecklingen av samarbeten mellan mobiltelefonoperatörer som använder Ericssons betalningssystem och externa leverantörer.