Comparative Analysis of Internet Key Exchange Protocols

被引:0
|
作者
Shaheen, Safdar Hussain [1 ]
Yousaf, Muhammad [1 ]
Majeed, Muhammad Younas [2 ]
机构
[1] Riphah Int Univ, Islamabad, Pakistan
[2] Quaid I Azam Univ, Islamabad, Pakistan
关键词
IPSec; IKE; Key Management; Comparative Analysis;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Internet Key Exchange (IKE) protocol is a vibrant component of Internet Security protocol (IPSec). It plays a vital role to accomplish the tasks of negotiation and establishment of security parameters, generation and management of cryptographic keys, mutual authentication of participating peers and establishing security associations. Since the IPSec security relies primarily on secure IKE, therefore the review and analysis of IKE versions is essential prior to their deployment in IPSec. This paper not only reviews the versions 1 and 2 of IKE but also presents a comparative analysis of these key management protocols.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Deniable authenticated key establishment for Internet protocols
    Boyd, C
    Mao, WB
    Paterson, KG
    SECURITY PROTOCOLS, 2005, 3364 : 255 - 273
  • [22] Analysis of the Internet key exchange protocol and its amendment based on public key signatures
    Fu, Xiaoqing
    Ding, Junmin
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2003, 31 (10):
  • [23] Modelling Time for Authenticated Key Exchange Protocols
    Schwenk, Joerg
    COMPUTER SECURITY - ESORICS 2014, PT II, 2014, 8713 : 277 - 294
  • [24] Security Verification for Authentication and Key Exchange Protocols
    Otat, Haruki
    Kiyomotot, Shinsaku
    Tanakat, Toshiaki
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (03): : 1 - 11
  • [25] Downgrade Resilience in Key-Exchange Protocols
    Bhargavan, Karthikeyan
    Brzuska, Christina
    Fournet, Cedric
    Green, Matthew
    Kohlweiss, Markulf
    Zanella-Beguelin, Santiago
    2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, : 506 - 525
  • [26] Post-quantum key exchange Protocols
    Li, Xiangdong
    Leung, Lin
    Kwan, Andis Chi-Tung
    Zhang, Xiaowen
    Kahanda, Dammika
    Anshel, Michael
    QUANTUM INFORMATION AND COMPUTATION IV, 2006, 6244
  • [27] Key exchange protocols for multiparty communication services
    Hosei University (Institute of Electrical and Electronics Engineers Inc., United States):
  • [28] Key exchange protocols for multiparty communication services
    Chan, CW
    Chang, CC
    FIRST INTERNATIONAL SYMPOSIUM ON CYBER WORLDS, PROCEEDINGS, 2002, : 241 - 248
  • [29] Scalable Protocols for Authenticated Group Key Exchange
    Jonathan Katz
    Moti Yung
    Journal of Cryptology, 2007, 20 : 85 - 113
  • [30] SEVERAL PRACTICAL PROTOCOLS FOR AUTHENTICATION AND KEY EXCHANGE
    LIM, CH
    LEE, PJ
    INFORMATION PROCESSING LETTERS, 1995, 53 (02) : 91 - 96