Further analysis of the Internet key exchange protocol
β Scribed by J Zhou
- Publisher
- Elsevier Science
- Year
- 2000
- Tongue
- English
- Weight
- 114 KB
- Volume
- 23
- Category
- Article
- ISSN
- 0140-3664
No coin nor oath required. For personal study only.
β¦ Synopsis
Secure communication over the Internet becomes an essential requirement for any value-added Internet application. The use of cryptography for secure communication brings out the requirement of cryptographic key management. This paper examines some security issues on the Internet Key Exchange (IKE) protocol specified in RFC 2409. The investigation is intended for clarifying some specification ambiguities in RFC 2409 and facilitating a correct implementation of the IKE protocol.
π SIMILAR VOLUMES
Lee et al. [4] proposed two new authenticated multiple key exchange protocols based on Elliptic Curve Cryptography (ECC) and bilinear pairings. In this paper, we show an impersonation attack on their pairing-based authenticated key exchange protocol. We demonstrate that any attacker can impersonate
The replication bypass model for sister chromatid exchange (SCE) proposed by Shafer is examined in detail. When applied through two cell cycles, the model predicts that potentially observable SCEs induced during one S phase will then be cancelled and rendered undetectable during the subsequent S pha
In this paper we present an attack on a fair exchange protocol proposed by Wu and Varadharajan. We show that, after two executions of the protocol, a dishonest participant can collect enough information in order to obtain some secret information of the other participant. This precisely allows him to