Journal ArticleDOI
Further analysis of the Internet key exchange protocol
TLDR
This paper examines some security issues on the Internet Key Exchange (IKE) protocol specified in RFC 2409 for clarifying some specification ambiguities inRFC 2409 and facilitating a correct implementation of the IKE protocol.About:
This article is published in Computer Communications.The article was published on 2000-11-01. It has received 43 citations till now. The article focuses on the topics: Group Domain of Interpretation & IPsec.read more
Citations
More filters
Book
Protocols for Authentication and Key Establishment
Colin Boyd,Anish Mathuria +1 more
TL;DR: This is the first comprehensive and integrated treatment of protocols for authentication and key establishment, which allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols which have been broken in the literature.
Patent
Methods and systems for generating encryption keys using random bit generators
TL;DR: In this paper, a cryptographically secure random number generator generates a random bit sequence that is included in a seed, which is provided along with a negotiated master secret to a key generation module.
Book ChapterDOI
Key exchange in IPsec revisited: formal analysis of IKEv1 and IKEv2
TL;DR: While no significant weaknesses are found on the secrecy of the session keys established by IKE, several previously unreported weaknesses on the authentication properties of IKE are found.
Book ChapterDOI
Deniable authenticated key establishment for internet protocols
TL;DR: Two public-key schemes to achieve “deniable authentication” for the Internet Key Exchange (IKE) are proposed, which can, in some situations, be more efficient than existing IKE protocols as well as having stronger deniability properties.
References
More filters
IP Encapsulating Security Payload (ESP)
S. Kent,R. Atkinson +1 more
TL;DR: This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6.
The Internet Key Exchange (IKE)
D. Harkins,D. Carrel +1 more
TL;DR: ISAKMP ([MSST98]) provides a framework for authentication and key exchange but does not define them.
Internet Security Association and Key Management Protocol (ISAKMP) Status of this Memo
TL;DR: The Internet Security Association and Key Management Protocol (ISAKMP) as discussed by the authors is a key management protocol that allows the creation and management of security associations, key generation techniques, and threat mitigation (e.g. denial of service and replay attacks).
Internet Security Association and Key Management Protocol (ISAKMP)
TL;DR: A Security Association protocol that negotiates, establishes, modifies and deletes Security Associations and their attributes is required for an evolving Internet, where there will be numerous security mechanisms and several options for each security mechanism.