The subject will focus on the reliable key exchanging method for security VPN. Using this method all these can be realized: secrets of key exchanging, identity of communication, non-deny of communication and usability of the key.According to the investigate and analysis for all of present key exchanging method, and follow to the IPSec and IKE standard brought forward by IETF, a effective and reliable key exchanging method is designed. Then, it will be realized by computer language and be confirmed by the practice.
|