Comparative Analysis of Internet Key Exchange Protocols

被引:0
|
作者
Shaheen, Safdar Hussain [1 ]
Yousaf, Muhammad [1 ]
Majeed, Muhammad Younas [2 ]
机构
[1] Riphah Int Univ, Islamabad, Pakistan
[2] Quaid I Azam Univ, Islamabad, Pakistan
关键词
IPSec; IKE; Key Management; Comparative Analysis;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Internet Key Exchange (IKE) protocol is a vibrant component of Internet Security protocol (IPSec). It plays a vital role to accomplish the tasks of negotiation and establishment of security parameters, generation and management of cryptographic keys, mutual authentication of participating peers and establishing security associations. Since the IPSec security relies primarily on secure IKE, therefore the review and analysis of IKE versions is essential prior to their deployment in IPSec. This paper not only reviews the versions 1 and 2 of IKE but also presents a comparative analysis of these key management protocols.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Analysis and modification of the Internet Key Exchange Protocols
    Jianfan Wei Renliang Yuan (Communication
    信息安全与通信保密, 2005, (07) : 156 - 159
  • [2] Comparative evaluation of successor Protocols to Internet Key Exchange (IKE)
    Haddad, H
    Mirmohamadi, H
    2005 3rd IEEE International Conference on Industrial Informatics (INDIN), 2005, : 692 - 696
  • [3] Analyzing the security flaws of internet key exchange protocols
    Zhang, Yong
    Feng, Dong-Lei
    Chen, Han-Sheng
    Bai, Ying-Cai
    Ruan Jian Xue Bao/Journal of Software, 2002, 13 (06): : 1173 - 1177
  • [4] Analysis of Two Authenticated Key Exchange Protocols
    Cheng, Qingfeng
    Hang, Guangguo
    Ma, Chuangui
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 398 - +
  • [5] Use of hybrid post-quantum key exchange in internet protocols
    Smyslov, Valery
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2024, 20 (3) : 447 - 454
  • [6] Efficient, DoS-resistant, secure key exchange for Internet protocols
    Aiello, W
    Bellovin, SM
    Blaze, M
    Canetti, R
    Ioannidis, J
    Keromytis, AD
    Reingold, O
    SECURITY PROTOCOLS, 2002, 2467 : 27 - 39
  • [7] Security Analysis of Broadcaster Group Key Exchange Protocols
    LI Li~ 1
    2. School of Computer
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1577 - 1580
  • [8] Further analysis of the Internet key exchange protocol
    Zhou, J
    COMPUTER COMMUNICATIONS, 2000, 23 (17) : 1606 - 1612
  • [9] A Comparative Analysis on Resource Discovery Protocols for The Internet of Things
    Khalil, Kasem
    Elgazzar, Khalid
    Bayoumi, Magdy
    2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [10] Efficient, DoS-resistant, secure key exchange for Internet protocols - (Transcript of discussion)
    Blaze, M
    SECURITY PROTOCOLS, 2002, 2467 : 40 - 48