Font Size: a A A

Research And Improvement Of Just Fast Keying Protocol

Posted on:2013-01-04Degree:MasterType:Thesis
Country:ChinaCandidate:J L MaFull Text:PDF
GTID:2218330374463953Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
In recent years, with a sharp increase in the amount of information exchange and information sharing data, information security are constantly improved existing security technologies can no longer meet the demand, at home and abroad on the Internet Key Exchange protocol and application also increasing, since most of the Internet key exchange protocol using virtual private network (VPN Virtual Private network) architecture. IPSec (IP Security) protocol stack to build the VPN protocol. Two computer build VPN with IPSec protocol to communicate, we must establish a security association (SA Security Association), which relates to the problem of how to protect information and security settings consensus.Internet Key Exchange (IKE) protocol is an important part of IPSec protocol stack is responsible for the interaction information before dynamic consultation and to ensure the relevance of information security. IKE protocol There are many loopholes, these defects lead to a lot of problems.The paper JFK protocol analysis and optimization goals. Compared with the IKE protocol, the JFK protocol has many advantages:IKE protocol does not have efficient, safe and simple. JFK agreement there are some drawbacks, such as no real PFS (Perfect Forward Secrecy), can not be completely stateless interaction. Through a detailed analysis of the JFK protocol, found the lack of agreement of JFK, made by studying the optimization, optimization of the JFK protocol is the JFK protocol is improved at the same time does not weaken the advantages of the original JFK agreement. The best use of the BAN-like logic reasoning, proof of the JFK protocol optimized to compensate for the lack of agreement of the original JFK, is reliable, efficient and simple.
Keywords/Search Tags:Virtual Private Network, IKE protocol, JFK protocol, Statelessinteraction, Perfect Forward Secrecy
PDF Full Text Request
Related items