Title
Technical Papers Parallel Session-VII: Comparative analysis of Internet Key Exchange protocols
Abstract/Description
Internet Key Exchange (IKE) protocol is a vibrant component of Internet Security protocol (IPSec). It plays a vital role to accomplish the tasks of negotiation and establishment of security parameters, generation and management of cryptographic keys, mutual authentication of participating peers and establishing security associations. Since the IPSec security relies primarily on secure IKE, therefore the review and analysis of IKE versions is essential prior to their deployment in IPSec. This paper not only reviews the versions 1 and 2 of IKE but also presents a comparative analysis of these key management protocols.
Keywords
Authentication, Protocols, Internet, Encryption, Digital signatures
Location
C-12, AMAN CED
Session Theme
Technical Papers Parallel Session-VII (Networks-II)
Session Type
Parallel Technical Session
Session Chair
Dr. Shahid Shaikh
Start Date
13-12-2015 2:30 PM
End Date
13-12-2015 2:50 PM
Recommended Citation
Shaheen, S. H., Yousaf, M., & Majeed, M. Y. (2015). Technical Papers Parallel Session-VII: Comparative analysis of Internet Key Exchange protocols. International Conference on Information and Communication Technologies. Retrieved from https://ir.iba.edu.pk/icict/2015/2015/36
COinS
Technical Papers Parallel Session-VII: Comparative analysis of Internet Key Exchange protocols
C-12, AMAN CED
Internet Key Exchange (IKE) protocol is a vibrant component of Internet Security protocol (IPSec). It plays a vital role to accomplish the tasks of negotiation and establishment of security parameters, generation and management of cryptographic keys, mutual authentication of participating peers and establishing security associations. Since the IPSec security relies primarily on secure IKE, therefore the review and analysis of IKE versions is essential prior to their deployment in IPSec. This paper not only reviews the versions 1 and 2 of IKE but also presents a comparative analysis of these key management protocols.