Methods and protocols for secure key negotiation using IKE

The IETF has advanced the IPsec protocols to draft standard status. These protocols include mechanisms for the establishment of a secure channel, via cryptographic key exchange, over an insecure medium. Such a channel can then be used for ensuring the confidentiality, authentication, and/or integrity of the communications between two parties. We explain the algorithms and protocols of IPsec's Internet Key Exchange (IKE) and discuss the types of security that the various IKE modes provide.

[1]  Eugene H. Spafford,et al.  The internet worm: crisis and aftermath , 1989 .

[2]  S. M. Bellovin,et al.  Security problems in the TCP/IP protocol suite , 1989, CCRV.

[3]  Hugo Krawczyk,et al.  SKEME: a versatile secure key exchange mechanism for Internet , 1996, Proceedings of Internet Society Symposium on Network and Distributed Systems Security.

[4]  R. Perlman,et al.  An overview of PKI trust models , 1999, IEEE Netw..

[5]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[6]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[7]  Eugene H. Spafford,et al.  Crisis and aftermath , 1989, Commun. ACM.