<s>
Secure	B-Protocol
Network	I-Protocol
Programming	I-Protocol
(	O
SNP	O
)	O
is	O
a	O
prototype	O
of	O
the	O
first	O
Secure	B-Protocol
Sockets	I-Protocol
Layer	I-Protocol
,	O
designed	O
and	O
built	O
by	O
the	O
Networking	O
Research	O
Laboratory	O
at	O
the	O
University	O
of	O
Texas	O
at	O
Austin	O
,	O
led	O
by	O
Simon	O
S	O
.	O
Lam	O
.	O
</s>
<s>
At	O
that	O
time	O
,	O
there	O
were	O
three	O
well-known	O
authentication	O
systems	O
built	O
(	O
MIT	O
's	O
Kerberos	B-Protocol
)	O
or	O
being	O
developed	O
(	O
DEC	O
's	O
SPX	O
and	O
IBM	O
's	O
KryptoKnight	O
)	O
.	O
</s>
<s>
Toward	O
the	O
goal	O
of	O
"	O
secure	B-Protocol
network	I-Protocol
programming	I-Protocol
for	O
the	O
masses	O
,	O
"	O
the	O
inventors	O
of	O
SNP	O
conceived	O
secure	B-Protocol
sockets	I-Protocol
as	O
a	O
high-level	O
abstraction	O
suitable	O
for	O
securing	O
Internet	O
applications	O
.	O
</s>
<s>
SNP	O
's	O
secure	B-Protocol
sockets	I-Protocol
support	O
both	O
stream	O
and	O
datagram	O
semantics	O
with	O
security	O
guarantees	O
(	O
i.e.	O
,	O
data	O
origin	O
authenticity	O
,	O
data	O
destination	O
authenticity	O
,	O
data	O
integrity	O
,	O
and	O
data	O
confidentiality	O
.	O
)	O
</s>
<s>
Many	O
of	O
the	O
ideas	O
and	O
design	O
choices	O
in	O
SNP	O
can	O
be	O
found	O
in	O
subsequent	O
secure	B-Protocol
sockets	I-Protocol
layers	I-Protocol
,	O
including	O
:	O
placing	O
authenticated	O
communication	O
endpoints	O
in	O
the	O
application	B-Application
layer	I-Application
,	O
use	O
of	O
public	B-Application
key	I-Application
cryptography	I-Application
for	O
authentication	O
,	O
a	O
handshake	O
protocol	O
for	O
establishing	O
session	O
state	O
including	O
a	O
shared	O
secret	O
,	O
use	O
of	O
symmetric	B-Algorithm
key	I-Algorithm
cryptography	I-Algorithm
for	O
data	O
confidentiality	O
,	O
and	O
managing	O
contexts	O
and	O
credentials	O
in	O
the	O
secure	B-Protocol
sockets	I-Protocol
layer	I-Protocol
.	O
</s>
<s>
The	O
paper	O
presented	O
on	O
June	O
8	O
,	O
1994	O
at	O
the	O
USENIX	O
Summer	O
Technical	O
Conference	O
includes	O
the	O
system	O
design	O
together	O
with	O
performance	O
measurement	O
results	O
from	O
the	O
prototype	O
implementation	O
to	O
clearly	O
demonstrate	O
the	O
practicality	O
of	O
a	O
secure	B-Protocol
sockets	I-Protocol
layer	I-Protocol
.	O
</s>
<s>
SNP	O
invented	O
secure	B-Protocol
sockets	I-Protocol
for	O
Internet	O
applications	O
in	O
general	O
,	O
independently	O
and	O
concurrently	O
with	O
the	O
design	O
and	O
development	O
of	O
the	O
HTTP	B-Protocol
protocol	I-Protocol
for	O
the	O
world-wide	O
web	O
which	O
was	O
still	O
in	O
its	O
infancy	O
in	O
1993	O
.	O
</s>
<s>
Subsequent	O
secure	B-Protocol
socket	I-Protocol
layers	I-Protocol
(	O
SSL	B-Protocol
by	O
Netscape	B-Protocol
and	O
TLS	B-Protocol
by	O
IETF	O
)	O
,	O
re-implemented	O
several	O
years	O
later	O
using	O
key	O
ideas	O
first	O
presented	O
in	O
SNP	O
,	O
enabled	O
secure	O
e-commerce	O
between	O
browsers	O
and	O
servers	O
.	O
</s>
<s>
Today	O
,	O
many	O
other	O
Internet	O
applications	O
(	O
including	O
email	O
)	O
use	O
HTTPS	B-Protocol
which	O
consists	O
of	O
HTTP	B-Protocol
running	O
over	O
a	O
secure	B-Protocol
sockets	I-Protocol
layer	I-Protocol
.	O
</s>
