The Techniques of Based Internet Key Exchange (IKE) Protocol to Secure Key Negotiation
IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING,
2022, Volume 22, Issue 3, Pages 147-154
https://doi.org/10.33103/uot.ijccce.22.3.14
Abstract
The Internet is a massive network that connects millions of users from all over the world and the data transmitted via it needs great protection, especially since that are in the age of big data. To solve part of this problem, IPsec was utilized, which is a set of protocols necessary to offer security to units of the Internet in general and the IP layer in particular. It is mostly based on major exchange protocols. The most frequent mechanism for transferring key materials and establishing security linkages between two entities is Internet Key Exchange (IKE). In the present work, it is proposed to use a public key that works together with Diffie-Hellman cryptography and the main advantages of a single-stage contribution (as opposed to the two-stage in standard IKE) it is better in terms of improved transfer and time (more time for the corresponding negotiation) to make the proposed IKE more secure with Simple account constraints
Main Subjects:
- Article View: 20
- PDF Download: 16