World Library  


Add to Book Shelf
Flag as Inappropriate
Email this Book

The Internet Key Exchange (Ike)

By Harkins, D.

Click here to view

Book Id: WPLBN0000692855
Format Type: PDF eBook
File Size: 90.79 KB.
Reproduction Date: 2005
Full Text

Title: The Internet Key Exchange (Ike)  
Author: Harkins, D.
Volume:
Language: English
Subject: Social Psychology, Sociology, Psychology
Collections: Technical eBooks Collection
Historic
Publication Date:
Publisher:

Citation

APA MLA Chicago

Harkins, D. (n.d.). The Internet Key Exchange (Ike). Retrieved from http://www.worldebooklibrary.net/


Description
Technical Reference Publication

Excerpt
Excerpt: This memo describes a hybrid protocol. The purpose is to negotiate, and provide authenticated keying material for, security associations in a protected manner. Processes which implement this memo can be used for negotiating virtual private networks (VPNs) and also for providing a remote user from a remote site (whose IP address need not be known beforehand) access to a secure host or network. Client negotiation is supported. Client mode is where the negotiating parties are not the endpoints for which security association negotiation is taking place. When used in client mode, the identities of the end parties remain hidden.

Table of Contents
Table Of Contents 1 Abstract........................................................ 2 2 Discussion...................................................... 2 3 Terms and Definitions........................................... 3 3.1 Requirements Terminology...................................... 3 3.2 Notation...................................................... 3 3.3 Perfect Forward Secrecty...................................... 5 3.4 Security Association.......................................... 5 4 Introduction.................................................... 5 5 Exchanges....................................................... 8 5.1 Authentication with Digital Signatures........................ 10 5.2 Authentication with Public Key Encryption..................... 12 5.3 A Revised method of Authentication with Public Key Encryption. 13 5.4 Authentication with a Pre-Shared Key.......................... 16 5.5 Quick Mode.................................................... 16 5.6 New Group Mode................................................ 20 5.7 ISAKMP Informational Exchanges................................ 20 6 Oakley Groups................................................... 21 6.1 First Oakley Group............................................ 21 6.2 Second Oakley Group........................................... 22 6.3 Third Oakley Group............................................ 22 6.4 Fourth Oakley Group........................................... 23 7 Payload Explosion of Complete Exchange.......................... 23 7.1 Phase 1 with Main Mode........................................ 23 7.2 Phase 2 with Quick Mode....................................... 25 8 Perfect Forward Secrecy Example................................. 27

 

Click To View

Additional Books


  • The Point of View (by )
  • The Pension Beaurepas (by )
  • The Patagonia (by )
  • The Papers (by )
  • The Papers (by )
  • The Middle Years (by )
  • The Marriages (by )
  • The Liar (by )
  • The Lesson of the Master (by )
  • The Jolly Corner (by )
  • The Great Good Place (by )
  • The Great Condition (by )
Scroll Left
Scroll Right

 



Copyright © World Library Foundation. All rights reserved. eBooks from World eBook Library are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.