Improved IKE Protocol Design Based On PKI/ECC

نویسندگان

  • Song-Ho Pak
  • Myong-Suk Pak
  • Chung-Hyok Jang
چکیده

This Paper proposes an ECDH key exchange method and an ECsig Digital Signature Authentication method based on ) ( 2m F E group with Koblits curve, man-in-the-middle attack prevention method for SA payload and initiator identification payload to design high intensity IKE that can be implemented in portable devices.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Internet IP Security PKI Profile of IKEv1/ISAKMP, IKEv2, and PKIX

The Internet Key Exchange (IKE) and Public Key Infrastructure for X.509 (PKIX) certificate profile both provide frameworks that must be profiled for use in a given application. This document provides a profile of IKE and PKIX that defines the requirements for using PKI technology in the context of IKE/IPsec. The document complements protocol specifications such as IKEv1 and IKEv2, which assume ...

متن کامل

Efficient transmission of PKI certificates using elliptic curve cryptography and its variants

The demand for wireless networks is increasing rapidly and it becomes essential to design existing Public-Key Infrastructure (PKI) useful for wireless devices. A PKI is a set of procedures needed to create, distribute and revoke digital certificates. PKI is an arrangement that binds public keys with respective user identities by means of a Certificate Authority (CA). The user identity must be u...

متن کامل

Prediction of Engineered Cementitious Composite Material Properties Using Artificial Neural Network

Cement-based composite materials like Engineered Cementitious Composites (ECCs) are applicable in the strengthening of structures because of the high tensile strength and strain. Proper mix proportion, which has the best mechanical properties, is so essential in ECC design material to use in structural components. In this paper, after finding the best mix proportion based on uniaxial tensile st...

متن کامل

Elliptic Curve Groups modulo a Prime (ECP Groups) for IKE and IKEv2

This document describes three Elliptic Curve Cryptography (ECC) groups for use in the Internet Key Exchange (IKE) and Internet Key Exchange version 2 (IKEv2) protocols in addition to previously defined groups. These groups are based on modular arithmetic rather than binary arithmetic. These groups are defined to align IKE and IKEv2 with other ECC implementations and standards, particularly NIST...

متن کامل

Key Management in IP-based Ubiquitous Sensor Networks: Issues, Challenges and Solutions

As wireless sensor networks continue to grow, so does the need for effective security mechanisms. Because sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it is imperative that these security concerns be addressed from the beginning of the system design. However, due to inherent resource and computing constraints, security in sensor networks po...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1604.08810  شماره 

صفحات  -

تاریخ انتشار 2016