scispace - formally typeset
Journal ArticleDOI

Further analysis of the Internet key exchange protocol

Jianying Zhou
- 01 Nov 2000 - 
- Vol. 23, Iss: 17, pp 1606-1612
TLDR
This paper examines some security issues on the Internet Key Exchange (IKE) protocol specified in RFC 2409 for clarifying some specification ambiguities inRFC 2409 and facilitating a correct implementation of the IKE protocol.
About
This article is published in Computer Communications.The article was published on 2000-11-01. It has received 43 citations till now. The article focuses on the topics: Group Domain of Interpretation & IPsec.

read more

Citations
More filters
Book

Protocols for Authentication and Key Establishment

Colin Boyd, +1 more
TL;DR: This is the first comprehensive and integrated treatment of protocols for authentication and key establishment, which allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols which have been broken in the literature.
Book

Computer communications

Robert Cole
Patent

Methods and systems for generating encryption keys using random bit generators

TL;DR: In this paper, a cryptographically secure random number generator generates a random bit sequence that is included in a seed, which is provided along with a negotiated master secret to a key generation module.
Book ChapterDOI

Key exchange in IPsec revisited: formal analysis of IKEv1 and IKEv2

TL;DR: While no significant weaknesses are found on the secrecy of the session keys established by IKE, several previously unreported weaknesses on the authentication properties of IKE are found.
Book ChapterDOI

Deniable authenticated key establishment for internet protocols

TL;DR: Two public-key schemes to achieve “deniable authentication” for the Internet Key Exchange (IKE) are proposed, which can, in some situations, be more efficient than existing IKE protocols as well as having stronger deniability properties.
References
More filters

IP Encapsulating Security Payload (ESP)

S. Kent, +1 more
TL;DR: This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6.

The Internet Key Exchange (IKE)

D. Harkins, +1 more
TL;DR: ISAKMP ([MSST98]) provides a framework for authentication and key exchange but does not define them.
Book

Computer communications

Robert Cole

Internet Security Association and Key Management Protocol (ISAKMP) Status of this Memo

TL;DR: The Internet Security Association and Key Management Protocol (ISAKMP) as discussed by the authors is a key management protocol that allows the creation and management of security associations, key generation techniques, and threat mitigation (e.g. denial of service and replay attacks).

Internet Security Association and Key Management Protocol (ISAKMP)

TL;DR: A Security Association protocol that negotiates, establishes, modifies and deletes Security Associations and their attributes is required for an evolving Internet, where there will be numerous security mechanisms and several options for each security mechanism.