Abstract :
The IETF has advanced the IPsec protocols to draft standard status. These protocols include mechanisms for the establishment of a secure channel, via cryptographic key exchange, over an insecure medium. Such a channel can then be used for ensuring the confidentiality, authentication, and/or integrity of the communications between two parties. We explain the algorithms and protocols of IPsec´s Internet Key Exchange (IKE) and discuss the types of security that the various IKE modes provide
Keywords :
Internet; cryptography; message authentication; telecommunication security; telecommunication standards; transport protocols; IETF; IKE; IPsec protocols; Internet Key Exchange; algorithms; authentication; communications integrity; confidentiality; cryptographic key exchange; draft standard; insecure medium; secure channel; secure key negotiation; Authentication; Cryptography; Floods; Graphics; IP networks; Independent component analysis; Power system security; Protection; Protocols; Virtual private networks;