Abstract | ||
---|---|---|
A VPN establishes a cryptographically secure networkusing the existing insecure infra structure of the Internet. Anumber of protocols, including IPSec have been designed toestablish VPNs. However, keys must be shared between thecommunicating peers before a VPN can be established. IKEprotocol is used for exchanging keys between authenticatedpeers over the Internet. However, IKE is vulnerable to DoSattacks and has security holes. A number of protocols havebeen proposed to replace IKE but these protocols also havevulnerabilities of their own. In this paper we present ananalysis of IKE and identify its security holes and designweaknesses. We also propose a more secure and efficientkey exchange protocol, Arcanum, and carry out its securityanalysis and comparison with existing protocols. Arcanumis more secure, robust to DoS attacks and efficient in termsof time and number of messages. |
Year | DOI | Venue |
---|---|---|
2004 | 10.1109/ITCC.2004.1286419 | ITCC (1) |
Keywords | Field | DocType |
present ananalysis,dos attack,efficient key exchange protocol,termsof time,security hole,toestablish vpns,thecommunicating peer,efficientkey exchange protocol,existing insecure infra structure,cryptography,key exchange,denial of service,dos attacks,internet,public key,security analysis,cryptographic protocols,protocols,payloads,it security,security,internet key exchange,ipsec | Internet Key Exchange,IPsec,Authentication,Key exchange,Cryptographic protocol,Computer security,Computer science,Internet Security Association and Key Management Protocol,Computer network,Public-key cryptography,The Internet | Conference |
ISBN | Citations | PageRank |
0-7695-2108-8 | 3 | 0.41 |
References | Authors | |
8 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
A. Mian | 1 | 1679 | 84.89 |
Ashraf Masood | 2 | 109 | 10.28 |