𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Further analysis of the Internet key exchange protocol

✍ Scribed by J Zhou


Publisher
Elsevier Science
Year
2000
Tongue
English
Weight
114 KB
Volume
23
Category
Article
ISSN
0140-3664

No coin nor oath required. For personal study only.

✦ Synopsis


Secure communication over the Internet becomes an essential requirement for any value-added Internet application. The use of cryptography for secure communication brings out the requirement of cryptographic key management. This paper examines some security issues on the Internet Key Exchange (IKE) protocol specified in RFC 2409. The investigation is intended for clarifying some specification ambiguities in RFC 2409 and facilitating a correct implementation of the IKE protocol.


πŸ“œ SIMILAR VOLUMES


Enhancements of authenticated multiple k
✍ Duc-Liem Vo; Hyunrok Lee; Chan-Yeob Yeun; Kwangjo Kim πŸ“‚ Article πŸ“… 2010 πŸ› Elsevier Science 🌐 English βš– 160 KB

Lee et al. [4] proposed two new authenticated multiple key exchange protocols based on Elliptic Curve Cryptography (ECC) and bilinear pairings. In this paper, we show an impersonation attack on their pairing-based authenticated key exchange protocol. We demonstrate that any attacker can impersonate

Further analysis of the replication bypa
✍ D. G. Stetka πŸ“‚ Article πŸ“… 1979 πŸ› Springer 🌐 English βš– 384 KB

The replication bypass model for sister chromatid exchange (SCE) proposed by Shafer is examined in detail. When applied through two cell cycles, the model predicts that potentially observable SCEs induced during one S phase will then be cancelled and rendered undetectable during the subsequent S pha

Cryptanalysis of the Wu–Varadhrajan fair
✍ Olivier Markowitch; Shahrokh Saeednia πŸ“‚ Article πŸ“… 2003 πŸ› Elsevier Science 🌐 English βš– 58 KB

In this paper we present an attack on a fair exchange protocol proposed by Wu and Varadharajan. We show that, after two executions of the protocol, a dishonest participant can collect enough information in order to obtain some secret information of the other participant. This precisely allows him to