期刊文献+

IPSec密钥交换的分析 被引量:4

Analysis of the IPSec Key Exchange Standard
下载PDF
导出
摘要 在对IKE进行分析的基础上,讨论了怎样在安全密钥协商过程中对发起者身份进行保护,并给出了具体实施步骤。针对IKE中在标准公钥加密认证中发起方也可能有多个公钥,而响应方并没有具体指出使用哪个公钥的问题,提出修改建议,使发起方通知对方使用自己哪个公钥进行解密。 How to protect the initiator identifier during the secure key negotiation based on the analysis of IKE is discussed, and the concrete implementation is given. At last, a defect of security in IKE protocol is pointed out, twhich public key is used in IKE phase one authenticated with public key encryption, then a modified suggestion is proposed to solve the problem.
出处 《计算机工程》 CAS CSCD 北大核心 2003年第6期145-146,共2页 Computer Engineering
基金 陕西省教育厅自然科学研究计划资助项目(00JK266)
关键词 IPSEC协议 通信协议 密钥交换 INTERNET 公钥加密认证 Internet key exchange;IP security;Identification protection;Authentication;Secure association
  • 相关文献

参考文献5

  • 1[1]Kent S, Atkinson R.RFC 2401: Security Architecture for the Internet Protocol. 1998-11
  • 2[2]Harkins D, Carrel D. RFC 2409: The Internet Key Exchange (IKE).1998-11
  • 3[3]Ferguson N, Schneier B. A Cryptographic Evaluation of IPSec. http://www. counterpane.com, 1999
  • 4[4]Borella M S. Methods and Protocols for Secure Key Negotiation Using IKE. IEEE Network, 2000-07/08:18-29
  • 5[5]Perlman R,Kaufman C. Analysis of the IPSec Key Exchange Standard. WET-ICE Security Conference, MIT, 2001

同被引文献14

  • 1董晓虎,徐明伟,徐恪.密钥交换协议IKE实现的可扩展设计[J].小型微型计算机系统,2004,25(6):1000-1004. 被引量:4
  • 2Harkings D,Carrel D.The Internet key exchange(IKE)[S].RFC 2409,1998
  • 3Maughan D,Schertler M ,Schneider M et al. Internet Security Association and key management protocoI(ISAKMP)[S].RFC2408,1998
  • 4J Zhou. Further Analysis of the Internet Key Exchange Protocol[J].Computer Communication, 2000; 23
  • 5Perlman R,Kaufman C.Analysis of the IPSec Key Exchange Standard[S].WET-ICE Security Conference,MIT,2001
  • 6[1]HARKINS D,CARREL D.RFC 2409 The Internet Key Exchange (IKE)[S].IETF,1998-11.
  • 7[3]VIJAY B,MOHAMED K,SCOTT W.IPSec VPN设计[M].北京:人民邮电出版社,2006.
  • 8[4]CBRIS M.网络安全评估[M].北京:中国电力出版社,2006.
  • 9[美]Carlton R.Davis 著,周永彬,冯登国等译.IPSec:VPN的安全实施.北京:清华大学出版社,2002.
  • 10SEC1:Elliptic Curve Cryptography.Standards fro Efficient Cryptography Group.2000.

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部