期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
An Internet Key Exchange Protocol Based on Public Key Infrastructure 被引量:2
1
作者 朱建明 马建峰 《Journal of Shanghai University(English Edition)》 CAS 2004年第1期51-56,共6页
Internet key exchange (IKE) is an automated key exchange mechanism that is used to facilitate the transfer of IPSec security associations (SAs). Public key infrastructure (PKI) is considered as a key element for provi... Internet key exchange (IKE) is an automated key exchange mechanism that is used to facilitate the transfer of IPSec security associations (SAs). Public key infrastructure (PKI) is considered as a key element for providing security to new distributed communication networks and services. In this paper, we concentrate on the properties of the protocol of Phase 1 IKE. After investigating IKE protocol and PKI technology, we combine IKE protocol and PKI and present an implementation scheme of the IKE based on PKI. Then, we give a logic analysis of the proposed protocol with the BAN-logic and discuss the security of the protocol. The result indicates that the protocol is correct and satisfies the security requirements of Internet key exchange. 展开更多
关键词 AUTHENTICATION ENCRYPTION Interent key exchange(ike) public key infrastructure(PKI).
下载PDF
E2E KEEP: End to End Key Exchange and Encryption Protocol for Accelerated Satellite Networks
2
作者 Hossein Fereidooni Hassan Taheri Mehran Mahramian 《International Journal of Communications, Network and System Sciences》 2012年第4期228-237,共10页
Accelerating methods are used to enhance TCP performance over satellite links by employing Performance Enhancement Proxies (PEPs). However, providing a secure connection through the PEPs seems to be impossible. In thi... Accelerating methods are used to enhance TCP performance over satellite links by employing Performance Enhancement Proxies (PEPs). However, providing a secure connection through the PEPs seems to be impossible. In this paper an appropriate method is proposed in order to provide an accelerated secure E2E connection. We show an efficient secure three-party protocol, based on public key infrastructure (PKI), which provides security against spiteful adversaries. Our construction is based on applying asymmetric cryptography techniques to the original IKE protocol. Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified in detail, we cannot be certain what constitute a flaw. Proofing security properties is essential for the development of secure protocol. We give a logic analysis of the proposed protocol with the BAN-logic and discuss the security of the protocol. The result indicates that the protocol is correct and satisfies the security requirements of Internet key exchange. Based on the results of this preliminary analysis, we have implemented a prototype of our security protocol and evaluated its performance and checked safety properties of security protocol, and the results show that the protocol is robust and safe against major security threats. 展开更多
关键词 Virtual PRIVATE Networks (VPNs) Public key Infrastructure Authentication Internet key exchange (ike) BAN-Logic
下载PDF
基于数字签名认证的IKE协议安全性分析及改进 被引量:4
3
作者 何韦伟 季新生 刘彩霞 《计算机应用》 CSCD 北大核心 2008年第7期1807-1809,1815,共4页
IKE协议的复杂性使得其存在一些安全漏洞。简要介绍基于数字签名认证方式的IKE协议工作机制之后,分析了IKE协议容易遭受的两种中间人攻击,针对中间人攻击导致用户身份泄漏的安全缺陷,提出两种改进方案并给出改进前后定量的性能分析。
关键词 ike 数字签名 中间人攻击 公钥
下载PDF
IKE协议及其安全性分析 被引量:4
4
作者 张琳 张永平 《计算机工程与设计》 CSCD 北大核心 2005年第9期2473-2475,2481,共4页
Internet密钥交换协议(IKE)是用于交换和管理在VPN中使用的加密密钥的。到目前为止,它依然存在安全缺陷。基于该协议的重要的现实意义,简单地介绍了它的工作机制,并对它进行了安全性分析;对于抵御中间人攻击和DoS攻击,给出了相应的修正... Internet密钥交换协议(IKE)是用于交换和管理在VPN中使用的加密密钥的。到目前为止,它依然存在安全缺陷。基于该协议的重要的现实意义,简单地介绍了它的工作机制,并对它进行了安全性分析;对于抵御中间人攻击和DoS攻击,给出了相应的修正方法;还对主模式下预共享密钥验证方法提出了新的建议;最后给出了它的两个发展趋势:JFK和IKEv2。 展开更多
关键词 ike 因特网密钥交换协议 IPSEC DOS 安全性分析
下载PDF
IPSec通信截获与阻断系统研究
5
作者 陈麟 李焕洲 +1 位作者 胡勇 戴宗坤 《计算机应用研究》 CSCD 北大核心 2005年第11期193-194,197,共3页
由于IPSec协议本身具有的完备性和安全性,使得阻断IPSec通信非常困难,特别是在IPSec通信截获与阻断设备并联接入的情况下,一旦通信双方建立起IPSec安全关联再实施阻断几乎是不可能的。给出了一种截获并阻断IPSec通信的实现方案,在此基础... 由于IPSec协议本身具有的完备性和安全性,使得阻断IPSec通信非常困难,特别是在IPSec通信截获与阻断设备并联接入的情况下,一旦通信双方建立起IPSec安全关联再实施阻断几乎是不可能的。给出了一种截获并阻断IPSec通信的实现方案,在此基础上,介绍了发现并阻断IPSec通信的方法。 展开更多
关键词 IPSec通信 阻断 ike(intemet key exchange) 安全关联
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部