Design of IPsec and IKE version 1 and 2 ∗
نویسندگان
چکیده
IPsec is a collection of protocols that provides network layer data integrity and confidentiality services. IKEv1 is a versatile key agreement protocol that allows perfect forward secrecy and identity protection (among other things). IKEv2 has similar functionalities as IKEv1, but provides a simpler and better approach to key exchange. Additionally, IKEv2 provides new methods for authentication and traffic selection. The goal of this paper is to analyze IPsec as a solution for IP layer security protocol.
منابع مشابه
Internet Key Exchange (IKEv2) Protocol
This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining security associations. This version of the IKE specification combines the contents of what IKEv2 draft-ietf-ipsec-ikev2-15.txt [Page 1] Internet-Draft August 13, 2004 were previously separate documents, including IS...
متن کاملIpsec Working Group
This document describes version 2 of the IKE (Internet Key Exchange) protocol. IKE performs mutual authentication and establishes an IKE security association that can be used to efficiently establish SAs for ESP and/or AH. This version greatly simplifies IKE by replacing the 8 possible phase 1 exchanges with a single exchange based on either public signature keys or shared secret keys. The sing...
متن کاملIPSEC Working Group Dan Harkins INTERNET
This document describes version 2 of the IKE (Internet Key Exchange) protocol. IKE performs mutual authentication and establishes an IKE security association that can be used to efficiently establish SAs for ESP, AH and/or IPcomp. This version greatly simplifies IKE by replacing the 8 possible phase 1 exchanges with a single exchange based on either public signature keys or shared secret keys. ...
متن کاملIPSEC Working Group Dan Harkins INTERNET - DRAFT Charlie
This document describes version 2 of the IKE (Internet Key Exchange) protocol. IKE performs mutual authentication and establishes an IKE security association that can be used to efficiently establish SAs for ESP, AH and/or IPcomp. This version greatly simplifies IKE by replacing the 8 possible phase 1 exchanges with a single exchange based on either public signature keys or shared secret keys. ...
متن کاملAppendix B : Cryptographic Protection of IKE Data
This document describes version 2 of the IKE (Internet Key Exchange) protocol. IKE performs mutual authentication and establishes an IKE security association that can be used to efficiently establish SAs for ESP, AH and/or IPcomp. This version greatly simplifies IKE by replacing the 8 possible phase 1 exchanges with a single exchange based on either public signature keys or shared secret keys. ...
متن کامل