Some concerns on key management protocols for IPsec implementation

被引:0
作者
Li, Hua [1 ]
Nickle, Elspeth [1 ]
机构
[1] Univ Lethbridge, Dept Math & Comp Sci, Lethbridge, AB T1K 3M4, Canada
来源
WMSCI 2005: 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Vol 8 | 2005年
关键词
network security; IPsec;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The concept of IPsec security is a very appealing one for network communications. All the necessary encryption, decryption, and authentication are done at one level in the network and completely transparent to users [1]. IPsec involves structures called security associations (SA) and two databases which reside in the kernel and are available to supply information for security services. When the kernel processes a packet for transmission out over the network, it first consults the Security Policy Database, to see if this is a type of packet that needs to have security processes applied to it. The organization's policies regarding security services are encapsulated into a set of criteria and recorded in this database. Generally, these criteria depend on the content and destination of the packets. With the help of information attached to each packet, the kernel can determine if security processing is necessary. In this paper, we will exam the critical issues with IPsec protocols, and conclude with the future evolvement of IPsec security and IPsec key management.
引用
收藏
页码:327 / 329
页数:3
相关论文
共 5 条
  • [1] HALLQVIST N, 2000, P FREENIX TRACK 2000
  • [2] Harkins Dan, 1998, 2409 IETF RFC
  • [3] Karn P., 1999, 2522 IETF RFC
  • [4] MAUGHAN D, 1998, 2408 IETF RFC
  • [5] Stallings William, 1999, Cryptography and network security: principles and practice