Sei sulla pagina 1di 8

PRESENTED BY : Anurag

Roll no:- 1703233

TOPIC : INTERNET KEY EXCHANGE


IPsec: IKE

• IKE is a protocol used to setup a security association in internet protocol


security.
• IKE protocol uses UDP to create a security association with other
devices.
• IKE public key algorithm are used to mutually aunthenticate
communicating parties.
• solves many problems :-1. Domain of service 2.poor security association
negotiation.
IKE Phases and Modes
IKE has 2 phases:
• IKE Phase 1
o Uses main or aggressive mode exchange
o Negotiates IKE SA
• IKE Phase 2
o Uses quick mode exchange
o Negotiates IPSec SAs
Diffie-Hellman Algorithm

• Algorithm for secure key exchange over unsecured


channels
• Based on the difficulty of finding discreet algorithms
• Used to establish a shared secret between parties
(usually the secret keys for symmetric encryption or
HMACs)
• This method allows 2 parties which have no prior knowledge of each
other to establish a shared secret key over an insecure channel.
Difference between aggressive and main mode

1. Provide to secure algo and cryptography key.


2. This method allows 2 parties which have no prior knowledge of each
other to establish a shared secret key over an insecure channel.
• aggressive and main mode:-
• aggressive accomplishes mutual authentication in 3 messages/proof ct
• main mode accomplishes mutual authentication in 6 messages/
cryptography proposal
SKIP

Simple Key-Management for Internet Protocol or SKIP was a protocol developed in 1995 by
the IETF Security Working Group for the sharing of encryption keys.
SKIP and Photuris were evaluated as key exchange mechanisms for IPsec before the
adoption of IKE in 1998.
SKIP and Photuris are used for security management protocols used for security
management
Skip is hybrid Key distribution protocol Simple Key Management for Internet Protocols
(SKIP)
SKIP uses the knowledge of its own secret key or private component and the destination's
public component to calculate a unique key that can only be used between them.
photuris

• domain of service of protection.


• uses dif hel algo
• identifies hiding
• It uses long term diffie hellman public key
• data encrytion: long term secrets should not be used to encrypt data so it
is preferred for short term data

Potrebbero piacerti anche