期刊文献+

一种支持交叉证书的IPSec VPN应用程序接口设计 被引量:1

A Design of IPSec VPN Application Interface Supporting Cross-Certification
下载PDF
导出
摘要 分析了IKE第一阶段主模式的交互过程,在CASC(CA-system Supporting Cross-certification)的基础上,提出了一种支持交叉证书的IPSec VPN应用程序接口设计,主要探讨了其中的处理流程和CASC端证书路径构造算法。该设计方案能够使IPSec VPN自动从CASC系统得到含交叉证书的有效证书链,因而能解决应用程序不支持交叉证书的问题。 This paper analyzed the exchange process of Phase 1 using Main Mode of IKE , and proposes a crosscertification supported Application interface design for IPSec VPN based on the CASC (CA-system Supporting Crosscertification) system. The paper mainly discusses the process and the algorithms of building certificate path on the CASC side. The proposed solution enables the automatic retrieve from CASC of valid certificate chain, which contains the cross certificates. Hence it solves the problem that applications do not support the cross certificates.
出处 《微电子学与计算机》 CSCD 北大核心 2007年第7期94-97,101,共5页 Microelectronics & Computer
基金 江苏省自然科学基金项目(BK2004039)
关键词 IPSEC VPN IKE CA 交叉认证 证书链 IPSec VPN IKE CA cross-certification certificate chain
  • 相关文献

参考文献6

  • 1田延安,王建文,贾晓云.基于自主开发操作系统的IPSec VPN网关设计[J].微电子学与计算机,2005,22(5):78-81. 被引量:3
  • 2[美]Carlton R.Davis.IPSec VPN的安全实施[M].周永彬,冯登国,译.清华大学出版社,2002.
  • 3Harkins D,Carrel D.The internet key exchange.RFC2409,November 1998.
  • 4杨芳玲.X.509证书撤消表及扩展的分析[J].微电子学与计算机,2005,22(10):85-87. 被引量:2
  • 5Housley R,Polk W,Ford W,et al.Internet X.509 public key infrastructure certificate and certificate revocation List (CRL) Profile.RFC3280,April 2002.
  • 6[美]Andrew Nash,公钥基础设施(PKI)实现和管理电子安全[M].清华大学出版社,2002.

二级参考文献8

  • 1R Housley, W Ford, W Polk, D Solo. Internet X.509 Public Key Infrastructure: Certificate and CRL Profile. January 1999.
  • 2S Micttli. Efficient Certificate Revocation. Technical Report TM-542b, MIT Laboratory for Computer Science,1996.
  • 3P C Kocher. On Certificate Revocation and Validation. In Prpc. International Conference on Financial Cryptogarphy,volume 1465 of Lecture Notes in Computer Science, 1998.
  • 4M Naor, K Nissim. Certificate Revocation and Certifite Update. In proceedings of the 7th USENIX Security Symposium, SECURITY, 1998: 217-228.
  • 5KENT S, ATKINSON R, Security Architecture for the Internet Protocol[S].RFC 2401,November 1998.
  • 6CALHOUN P, Tunnel Establishment Protocol[S]. Internet Draft, March 1998
  • 7田延安.浅谈网络信息的安全性及相关安全机制和技术[J].计算机科学,2004,31(9):37-40.
  • 8StepherT.Satchell H.B.JClfiford.inuxIP协议栈源代码分析[M].机械工业出版社,2000,11..

共引文献4

同被引文献5

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部