Font Size: a A A

The Research And Implementation Of IKE Protocol On The Basis Of The Credible Third Party

Posted on:2006-10-09Degree:MasterType:Thesis
Country:ChinaCandidate:J F WangFull Text:PDF
GTID:2168360152990295Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
IPSec protocol will be next network security standard, and IKE protocol — its key exchange protocol — plays an important role in IPSec protocol security. The implementation of key exchange protocol influences on the security of IPSec protocol, as well as the security of VPN which is based on IPSec protocol.The paper has discussed IKE protocol to explain the importance of IKE protocol in network security, and points out the weakness of IKE protocol in the attack to the transform payload and key management complexity. Then, some solutions are put forward.Some useful work has been done in these aspects as follows:(l)The weaknesses of IKE protocol incapable of resisting the attack to the transform payload are pointed out, and improving methods are suggested:(2)the complexity of IKE protocol management key are discussed;(3)the credible third party are introduced into IKE protocol to solve the problem of complexity of IKE protocol management key. With the case of Kerberos service, implementing scheme of the credible third party into IKE protocol are designed.
Keywords/Search Tags:Key exchange, The IKE protocol, The credible third party, The Kerberos protocol
PDF Full Text Request
Related items