Improved IKE Protocol Design Based On PKI/ECC
نویسندگان
چکیده
This Paper proposes an ECDH key exchange method and an ECsig Digital Signature Authentication method based on ) ( 2m F E group with Koblits curve, man-in-the-middle attack prevention method for SA payload and initiator identification payload to design high intensity IKE that can be implemented in portable devices.
منابع مشابه
The Internet IP Security PKI Profile of IKEv1/ISAKMP, IKEv2, and PKIX
The Internet Key Exchange (IKE) and Public Key Infrastructure for X.509 (PKIX) certificate profile both provide frameworks that must be profiled for use in a given application. This document provides a profile of IKE and PKIX that defines the requirements for using PKI technology in the context of IKE/IPsec. The document complements protocol specifications such as IKEv1 and IKEv2, which assume ...
متن کاملEfficient transmission of PKI certificates using elliptic curve cryptography and its variants
The demand for wireless networks is increasing rapidly and it becomes essential to design existing Public-Key Infrastructure (PKI) useful for wireless devices. A PKI is a set of procedures needed to create, distribute and revoke digital certificates. PKI is an arrangement that binds public keys with respective user identities by means of a Certificate Authority (CA). The user identity must be u...
متن کاملPrediction of Engineered Cementitious Composite Material Properties Using Artificial Neural Network
Cement-based composite materials like Engineered Cementitious Composites (ECCs) are applicable in the strengthening of structures because of the high tensile strength and strain. Proper mix proportion, which has the best mechanical properties, is so essential in ECC design material to use in structural components. In this paper, after finding the best mix proportion based on uniaxial tensile st...
متن کاملElliptic Curve Groups modulo a Prime (ECP Groups) for IKE and IKEv2
This document describes three Elliptic Curve Cryptography (ECC) groups for use in the Internet Key Exchange (IKE) and Internet Key Exchange version 2 (IKEv2) protocols in addition to previously defined groups. These groups are based on modular arithmetic rather than binary arithmetic. These groups are defined to align IKE and IKEv2 with other ECC implementations and standards, particularly NIST...
متن کاملKey Management in IP-based Ubiquitous Sensor Networks: Issues, Challenges and Solutions
As wireless sensor networks continue to grow, so does the need for effective security mechanisms. Because sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it is imperative that these security concerns be addressed from the beginning of the system design. However, due to inherent resource and computing constraints, security in sensor networks po...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1604.08810 شماره
صفحات -
تاریخ انتشار 2016