| Owing to inherently frailty of network, attacks and threats coming from many aspects, the security and privacy of information in network environment is especialy important. In recent years, people use the IPSec proptcol by using of reasonable methods of key negotiation and feasible encrypt or verify algorithms to encrypt and authenticate the IP packet and ensure the information security of the communication. Meanwhile, with the IKE protocol of continuous improvement, it is not just limited to the IPSec application, in many other auto needs of the security key negotiation and management agreement, will have a wide range of applications.In this thesis, we focus on the implementation of the IKE protocol. The biggest highlight of the papers is not only on the IKEv2 protocol Coding, more importantly, after the completion of the software system implementation and security analysis, when both sides to take pre-shared key Premise, implementing a man in the middle attack.The main work of this paper includes the following contents:Analyzed the IPSec protocol and the role of the IKE protocol. Analyzed the IKEvl protocol's security weaknesses and deficiencies, IKEv2 protocol's security. Designed the implementation of IKEv2 protocol in the Linux operating system, specifically including the framework of the software system design, the division of each module, the main data structure and interfaces. Designed a Man In The Middle attack program and implemented a prototype system. Test the effectiveness of the IKEv2 software system and Man In The Middle attack program, concluded the work and prospect for the future work. |