Stephen Kent (network security)

Last updated
Stephen Kent
Stephen Kent - 2013.jpg
Born (1951-01-25) January 25, 1951 (age 73)

Stephen Thomas Kent (born January 25, 1951) is an American computer scientist, noted for his contributions to network security.

Kent was born in New Orleans, Louisiana. In 1969 he graduated from Ridgewood Preparatory School in Metairie, Louisiana, and in 1973 from Loyola University New Orleans with a B.S. degree in mathematics.[ citation needed ] From 1973 to 1974 he attended Tulane University as graduate student in mathematics, then moved to the Massachusetts Institute of Technology as a graduate student in computer science from 1974 to 1980. He received his master's degree from MIT in 1976, [1] and his PhD in 1980. [2]

While a graduate student, Kent spent two summers at BBN Technologies, which he joined full-time in 1980 after receiving his doctorate degree. He ultimately became BBN's Chief Scientist for Security Technologies. Kent is best known for his role in developing Internet standards. He served as a member of the Internet Architecture Board (1983-1994), and chaired the Privacy and Security Research Group of the Internet Research Task Force (1985-1998) and the Privacy Enhanced Mail (PEM) working group of the Internet Engineering Task Force (IETF) from 1990 to 1995, during which time he also co-chaired the Public Key Infrastructure Working Group. [3] In 1988, he was the primary author of the "core" IPsec standards, [4] [5] [6] which he continued improving in 2005. [7] [8] [9] [10] He was also active in efforts to secure the Border Gateway Protocol. He also chaired the Federal Advisory Committee to Develop a FIPS for Federal Key Management Infrastructure (1996-1998), and was active in a number of National Research Council studies.

Kent is an ACM Fellow and a member of the Internet Society. He was inducted into the Internet Hall of Fame in 2013, where he is recognized as "a pioneer in the architecture of network security systems, including the design and development of network layer encryption and access-control systems and standards; secure transport layer protocols; secure e-mail technology; Public Key Infrastructure standards and certification authority systems." [11]

Related Research Articles

The Dynamic Host Configuration Protocol (DHCP) is a network management protocol used on Internet Protocol (IP) networks for automatically assigning IP addresses and other communication parameters to devices connected to the network using a client–server architecture.

In computer network engineering, an Internet Standard is a normative specification of a technology or methodology applicable to the Internet. Internet Standards are created and published by the Internet Engineering Task Force (IETF). They allow interoperation of hardware and software from different sources which allows internets to function. As the Internet became global, Internet Standards became the lingua franca of worldwide communications.

<span class="mw-page-title-main">Internet Protocol version 4</span> Fourth version of the Internet Protocol

Internet Protocol version 4 (IPv4) is the fourth version of the Internet Protocol (IP). It is one of the core protocols of standards-based internetworking methods in the Internet and other packet-switched networks. IPv4 was the first version deployed for production on SATNET in 1982 and on the ARPANET in January 1983. It is still used to route most Internet traffic today, even with the ongoing deployment of Internet Protocol version 6 (IPv6), its successor.

<span class="mw-page-title-main">IPv6</span> Version 6 of the Internet Protocol

Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet. IPv6 was developed by the Internet Engineering Task Force (IETF) to deal with the long-anticipated problem of IPv4 address exhaustion, and was intended to replace IPv4. In December 1998, IPv6 became a Draft Standard for the IETF, which subsequently ratified it as an Internet Standard on 14 July 2017.

A datagram is a basic transfer unit associated with a packet-switched network. Datagrams are typically structured in header and payload sections. Datagrams provide a connectionless communication service across a packet-switched network. The delivery, arrival time, and order of arrival of datagrams need not be guaranteed by the network.

In computing, Internet Protocol Security (IPsec) is a secure network protocol suite that authenticates and encrypts packets of data to provide secure encrypted communication between two computers over an Internet Protocol network. It is used in virtual private networks (VPNs).

The Routing Information Protocol (RIP) is one of the oldest distance-vector routing protocols which employs the hop count as a routing metric. RIP prevents routing loops by implementing a limit on the number of hops allowed in a path from source to destination. The largest number of hops allowed for RIP is 15, which limits the size of networks that RIP can support.

<span class="mw-page-title-main">Network Time Protocol</span> Standard protocol for synchronizing time across devices

The Network Time Protocol (NTP) is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks. In operation since before 1985, NTP is one of the oldest Internet protocols in current use. NTP was designed by David L. Mills of the University of Delaware.

In computing, Internet Key Exchange is the protocol used to set up a security association (SA) in the IPsec protocol suite. IKE builds upon the Oakley protocol and ISAKMP. IKE uses X.509 certificates for authentication ‒ either pre-shared or distributed using DNS ‒ and a Diffie–Hellman key exchange to set up a shared session secret from which cryptographic keys are derived. In addition, a security policy for every peer which will connect must be manually maintained.

The Bootstrap Protocol (BOOTP) is a computer networking protocol used in Internet Protocol networks to automatically assign an IP address to network devices from a configuration server. The BOOTP was originally defined in RFC 951 published in 1985.

In Internet networking, a private network is a computer network that uses a private address space of IP addresses. These addresses are commonly used for local area networks (LANs) in residential, office, and enterprise environments. Both the IPv4 and the IPv6 specifications define private IP address ranges.

Phil Karn is a retired American engineer from Lutherville, Maryland. He earned a bachelor's degree in electrical engineering from Cornell University in 1978 and a master's degree in electrical engineering from Carnegie Mellon University in 1979. From 1979 until 1984, Karn worked at Bell Labs in Naperville, Illinois, and Murray Hill, New Jersey. From 1984 until 1991, he was with Bell Communications Research in Morristown, New Jersey. From 1991 through to his retirement, he worked at Qualcomm in San Diego, where he specialized in wireless data networking protocols, security, and cryptography.

<span class="mw-page-title-main">Bob Braden</span> American computer scientist (1934–2018)

Robert Braden was an American computer scientist who played a role in the development of the Internet. His research interests included end-to-end network protocols, especially in the transport and network layers.

The internet layer is a group of internetworking methods, protocols, and specifications in the Internet protocol suite that are used to transport network packets from the originating host across network boundaries; if necessary, to the destination host specified by an IP address. The internet layer derives its name from its function facilitating internetworking, which is the concept of connecting multiple networks with each other through gateways.

In computer networking, the Tunnel Setup Protocol (TSP) is an experimental networking control protocol used to negotiate IP tunnel setup parameters between a tunnel client host and a tunnel broker server, the tunnel end-points. A major use of TSP is in IPv6 transition mechanisms.

A Request for Comments (RFC), in the context of Internet governance, is a type of publication from the Internet Engineering Task Force (IETF) and the Internet Society (ISOC), usually describing methods, behaviors, research, or innovations applicable to the working of the Internet and Internet-connected systems.

An IPv6 packet is the smallest message entity exchanged using Internet Protocol version 6 (IPv6). Packets consist of control information for addressing and routing and a payload of user data. The control information in IPv6 packets is subdivided into a mandatory fixed header and optional extension headers. The payload of an IPv6 packet is typically a datagram or segment of the higher-level transport layer protocol, but may be data for an internet layer or link layer instead.

In computer networking, the link layer is the lowest layer in the Internet protocol suite, the networking architecture of the Internet. The link layer is the group of methods and communications protocols confined to the link that a host is physically connected to. The link is the physical and logical network component used to interconnect hosts or nodes in the network and a link protocol is a suite of methods and standards that operate only between adjacent network nodes of a network segment.

Bump-in-the-wire (BITW) is a class of communications devices which can be inserted into existing (legacy) systems to enhance the integrity, confidentiality, or reliability of communications across an existing logical link without altering the communications endpoints. The term was originally used to indicate that the device should introduce only a relatively small increased latency in communications compared to the original, unsecured, approach.

References

  1. Encryption-based Protection Protocols for Interactive User-Computer Communication over Physically Unsecured Channels, by Stephen Thomas Kent, masters thesis, Massachusetts Institute of Technology, June 1976.
  2. Protecting Externally Supplied Software in Small Computers, PhD thesis, Massachusetts Institute of Technology, September 1980, Biography, pages 253-254.
  3. "Dr. Stephen T. Kent", IT History Society.
  4. S. Kent; R. Atkinson (November 1998). Security Architecture for the Internet Protocol. Network Working Group. doi: 10.17487/RFC2401 . RFC 2401.Obsolete. Obsoleted by RFC  4301. Obsoletes RFC  1825. Updated by RFC  3168.
  5. S. Kent; R. Atkinson (November 1998). IP Authentication Header. Network Working Group. doi: 10.17487/RFC2402 . RFC 2402.Obsolete. Obsoleted by RFC  4303 and 4205. Obsoletes RFC  1826.
  6. S. Kent; R. Atkinson (November 1998). IP Encapsulating Security Payload (ESP). Network Working Group. doi: 10.17487/RFC2406 . RFC 2406.Obsolete. Obsoleted by RFC  4303, 4305. Obsoletes RFC  1827.
  7. S. Kent; K. Seo (December 2005). Security Architecture for the Internet Protocol. Network Working Group. doi: 10.17487/RFC4301 . RFC 4301.Proposed Standard. Obsoletes RFC  2401. Updated by RFC  6040 and 7619.
  8. S. Kent (December 2005). IP Authentication Header. Network Working Group. doi: 10.17487/RFC4302 . RFC 4302.Proposed Standard. Obsoletes RFC  2402.
  9. S. Kent (December 2005). IP Encapsulating Security Payload. Network Working Group. doi: 10.17487/RFC4303 . RFC 4303.Proposed Standard. Obsoletes RFC  2406.
  10. S. Kent (December 2005). Extended Sequence Number (ESN) Addendum to IPsec Domain of Interpretation (DOI) for Internet Security Association and Key Management Protocol (ISAKMP). Network Working Group. doi: 10.17487/RFC4304 . RFC 4304.Proposed Standard.
  11. "Stephen Kent", Internet Hall of Fame.