Methods and protocols for secure key negotiation using IKE

被引:7
作者
Borella, MS
机构
来源
IEEE NETWORK | 2000年 / 14卷 / 04期
关键词
D O I
10.1109/65.855476
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The IETF has recently advanced the IPsec protocols to draft standard status. These protocols include mechanisms for the establishment of a secure channel, via cryptographic key exchange, over an insecure medium. Such a channel can then be used for ensuring the confidentiality, authentication, and/or integrity of the communications between two parties. In this article we explain the algorithms and protocols of IPsec's Internet Key Exchange and discuss the types of security that the various IKE modes provide.
引用
收藏
页码:18 / 29
页数:12
相关论文
共 29 条
[1]  
Allen C., 1999, RFC, DOI [DOI 10.17487/RFC2246, 10.17487/RFC2246]
[2]  
[Anonymous], 1998, RFC2409
[3]  
[Anonymous], 2402 RFC
[4]  
[Anonymous], 2407 RFC
[5]  
[Anonymous], 1998, 2406 RFC
[6]  
*ANSI, 1981, X392 ANSI DEA
[7]  
*ANSI, 1985, X917 ANSI AM BANK AS
[8]  
Bellovin S. M., 1989, Computer Communication Review, V19, P32, DOI 10.1145/378444.378449
[9]  
BORELLA MS, 1999, UNPUB REALM SPECIFIC
[10]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654