Skip Abstract Section
Abstract
ISAKMP ([MSST98]) provides a framework for authentication and key exchange but does not define them. ISAKMP is designed to be key exchange independant; that is, it is designed to support many different key exchanges.
RFC Downloads
ZIP
Cited By
- Guo J, Zhao D, Gu C, Chen X, Zhang X and Ju M (2024). An enhanced state-aware model learning approach for security analysis in lightweight protocol implementations, Journal of Cloud Computing: Advances, Systems and Applications, 13:1, Online publication date: 30-Jan-2024.
- Langer M and Bermbach R (2022). NTS4PTP — A comprehensive key management solution for PTP networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 213:C, Online publication date: 4-Aug-2022.
- Sun S (2021). A Chosen Random Value Attack on WPA3 SAE Authentication Protocol, Digital Threats: Research and Practice, 3:2, (1-8), Online publication date: 30-Jun-2022.
- Gazdag S, Grundner-Culemann S, Guggemos T, Heider T and Loebenberger D A formal analysis of IKEv2’s post-quantum extension Proceedings of the 37th Annual Computer Security Applications Conference, (91-105)
- Chow M and Ma M (2022). A lightweight traceable D2D authentication and key agreement scheme in 5G cellular networks, Computers and Electrical Engineering, 95:C, Online publication date: 1-Oct-2021.
- Adrian D, Bhargavan K, Durumeric Z, Gaudry P, Green M, Halderman J, Heninger N, Springall D, Thomé E, Valenta L, VanderSloot B, Wustrow E, Zanella-Béguelin S and Zimmermann P (2018). Imperfect forward secrecy, Communications of the ACM, 62:1, (106-114), Online publication date: 19-Dec-2018.
- Krzywiecki Ł, Kluczniak K, Kozieł P and Panwar N (2018). Privacy-oriented dependency via deniable SIGMA protocol, Computers and Security, 79:C, (53-67), Online publication date: 1-Nov-2018.
- Checkoway S, Maskiewicz J, Garman C, Fried J, Cohney S, Green M, Heninger N, Weinmann R, Rescorla E and Shacham H (2018). Where did I leave my keys?, Communications of the ACM, 61:11, (148-155), Online publication date: 26-Oct-2018.
- Cohney S, Green M and Heninger N Practical State Recovery Attacks against Legacy RNG Implementations Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, (265-280)
- Alboghdady S, Winter S, Taha A, Zhang H and Suri N C'mon Proceedings of the 12th International Conference on Availability, Reliability and Security, (1-6)
- Lee D and Kim K (2017). Improved Authentication of Binding Update Protocol in Mobile IPv6 Networks, Wireless Personal Communications: An International Journal, 94:3, (351-367), Online publication date: 1-Jun-2017.
- Chung T, Liu Y, Choffnes D, Levin D, Maggs B, Mislove A and Wilson C Measuring and Applying Invalid SSL Certificates Proceedings of the 2016 Internet Measurement Conference, (527-541)
- Checkoway S, Maskiewicz J, Garman C, Fried J, Cohney S, Green M, Heninger N, Weinmann R, Rescorla E and Shacham H A Systematic Analysis of the Juniper Dual EC Incident Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, (468-479)
- Michalevsky Y, Nath S and Liu J MASHaBLE Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, (387-400)
- Liyanage M, Kumar P, Ylianttila M and Gurtov A (2016). Novel secure VPN architectures for LTE backhaul networks, Security and Communication Networks, 9:10, (1198-1215), Online publication date: 10-Jul-2016.
- Coron J Security Analysis of the Modular Enhanced Symmetric Role Authentication mERA Protocol LNCS Essays on The New Codebreakers - Volume 9100, (518-542)
- Adrian D, Bhargavan K, Durumeric Z, Gaudry P, Green M, Halderman J, Heninger N, Springall D, Thomé E, Valenta L, VanderSloot B, Wustrow E, Zanella-Béguelin S and Zimmermann P Imperfect Forward Secrecy Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, (5-17)
- Nguyen B and Sprenger C Abstractions for Security Protocol Verification Proceedings of the 4th International Conference on Principles of Security and Trust - Volume 9036, (196-215)
- Naylor D, Mukerjee M and Steenkiste P (2014). Balancing accountability and privacy in the network, ACM SIGCOMM Computer Communication Review, 44:4, (75-86), Online publication date: 25-Feb-2015.
- Naylor D, Mukerjee M and Steenkiste P Balancing accountability and privacy in the network Proceedings of the 2014 ACM conference on SIGCOMM, (75-86)
- Yao A and Zhao Y OAKE Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, (1113-1128)
- Tsankov P, Dashti M and Basin D Semi-valid input coverage for fuzz testing Proceedings of the 2013 International Symposium on Software Testing and Analysis, (56-66)
- Tsankov P, Dashti M and Basin D SecFuzz Proceedings of the 7th International Workshop on Automation of Software Test, (1-7)
- El Kalam A, Maachaoui M, Idboufker N, Lahcen H and Ouahman A (2012). A Secure Architecture for Nomadic User in IMS Network, International Journal of Mobile Computing and Multimedia Communications, 4:1, (1-17), Online publication date: 1-Jan-2012.
- Kuppusamy L, Rangasamy J, Stebila D, Boyd C and Gonzalez Nieto J Towards a provably secure dos-resilient key exchange protocol with perfect forward secrecy Proceedings of the 12th international conference on Cryptology in India, (379-398)
- Yue Q, Liu F and Xue R Some improvements to the cost-based framework for analyzing denial of service attacks Proceedings of the Third international conference on Trusted Systems, (84-101)
- Cremers C Key exchange in IPsec revisited Proceedings of the 16th European conference on Research in computer security, (315-334)
- Mödersheim S Diffie-Hellman without difficulty Proceedings of the 8th international conference on Formal Aspects of Security and Trust, (214-229)
- Yang G, Duan S, Wong D, Tan C and Wang H Authenticated key exchange under bad randomness Proceedings of the 15th international conference on Financial Cryptography and Data Security, (113-126)
- Szałachowski P and Kotulski Z (2011). Secure time information in the internet key exchange protocol, Annales UMCS, Informatica, 11:3, (41-56), Online publication date: 1-Jan-2011.
- Walker J and Li J Key exchange with anonymous authentication using DAA-SIGMA protocol Proceedings of the Second international conference on Trusted Systems, (108-127)
- Sasse R, Escobar S, Meadows C and Meseguer J Protocol analysis modulo combination of theories Proceedings of the 6th international conference on Security and trust management, (163-178)
- Rubino R An open system for transparent firewall authentication and user traffic identification within corporate intranets Proceedings of the 9th ACM SIGITE conference on Information technology education, (113-118)
- Lu N, Zhou H and Qin Y A comparison study of IKE protocols Proceedings of the International Conference on Mobile Technology, Applications, and Systems, (1-5)
- Allard F, Combes J, Bonnin J and Bournelle J IKE context transfer in an IPv6 mobility environment Proceedings of the 3rd international workshop on Mobility in the evolving internet architecture, (55-60)
- Mehdizadeh A, Khatun S, Abdullah R, Ali B and Kurup G Experimental test-bed on security enhancement of Route Optimization in mobile IPv6 wireless networks Proceedings of the Fifth IASTED International Conference on Communication Systems and Networks, (22-27)
- Miltchev S, Smith J, Prevelakis V, Keromytis A and Ioannidis S (2008). Decentralized access control in distributed file systems, ACM Computing Surveys, 40:3, (1-30), Online publication date: 1-Aug-2008.
- Menezes A and Ustaoglu B Comparing the Pre- and Post-specified Peer Models for Key Agreement Proceedings of the 13th Australasian conference on Information Security and Privacy, (53-68)
- Srivatsa M, Iyengar A, Yin J and Liu L (2008). Mitigating application-level denial of service attacks on Web servers, ACM Transactions on the Web, 2:3, (1-49), Online publication date: 1-Jul-2008.
- Sharp R, Madhavapeddy A, Want R and Pering T Enhancing web browsing security on public terminals using mobile composition Proceedings of the 6th international conference on Mobile systems, applications, and services, (94-105)
- Mendez A, Ruiz P, Lopez R, Perez G, Skarmeta A and Taniuchi K (2008). OpenIKEv2, IEICE - Transactions on Information and Systems, E91-D:5, (1319-1329), Online publication date: 1-May-2008.
- Cervesato I, Jaggard A, Scedrov A, Tsay J and Walstad C (2008). Breaking and fixing public-key Kerberos, Information and Computation, 206:2-4, (402-424), Online publication date: 1-Feb-2008.
- Toll D, Karger P, Palmer E, McIntosh S and Weber S (2008). The Caernarvon secure embedded operating system, ACM SIGOPS Operating Systems Review, 42:1, (32-39), Online publication date: 1-Jan-2008.
- Niculescu M, Niculescu E and Resceanu I Mobile IP security and scalable support for transparent host mobility on the internet Proceedings of the 7th Conference on 7th WSEAS International Conference on Applied Computer Science - Volume 7, (214-221)
- Ole Kürtz K, Küsters R and Wilke T Selecting theories and nonce generation for recursive protocols Proceedings of the 2007 ACM workshop on Formal methods in security engineering, (61-70)
- Zhang B, Al-Shaer E, Jagadeesan R, Riely J and Pitcher C Specifications of a high-level conflict-free firewall policy language for multi-domain networks Proceedings of the 12th ACM symposium on Access control models and technologies, (185-194)
- Bournelle J, Combes J, Laurent-Maknavicius M and Larafa S Using PANA for mobile IPv6 bootstrapping Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet, (345-355)
- Datta A, Derek A, Mitchell J and Roy A (2007). Protocol Composition Logic (PCL), Electronic Notes in Theoretical Computer Science (ENTCS), 172, (311-358), Online publication date: 1-Apr-2007.
- Wu C, Huang C and Irwin J Using Identity-Based Privacy-Protected Access Control Filter (IPACF) to against denial of service attacks and protect user privacy Proceedings of the 2007 spring simulation multiconference - Volume 3, (362-369)
- Xu S and Yung M K-anonymous multi-party secret handshakes Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security, (72-87)
- Di Raimondo M, Gennaro R and Krawczyk H Deniable authentication and key exchange Proceedings of the 13th ACM conference on Computer and communications security, (400-409)
- Merino P, García-Martínez A, Organero M and Kloos C Enabling practical IPsec authentication for the internet Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I, (392-403)
- Li M and Feng H Chaotically masking traffic pattern to prevent traffic pattern analysis attacks for mission critical applications in computer communication networks Proceedings of the Second international conference on Advances in Natural Computation - Volume Part II, (448-451)
- Zúquete A and Marques H A security architecture for protecting LAN interactions Proceedings of the 9th international conference on Information Security, (311-326)
- Bellare M New proofs for NMAC and HMAC Proceedings of the 26th annual international conference on Advances in Cryptology, (602-619)
- Tschofenig H and Fu X (2006). Securing the Next Steps In Signalling (NSIS) protocol suite, International Journal of Internet Protocol Technology, 1:4, (271-282), Online publication date: 1-Aug-2006.
- Koo J, Koo J and Lee D A new authentication scheme of binding update protocol on handover in mobile IPv6 networks Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing, (972-978)
- Karger P Privacy and security threat analysis of the federal employee personal identity verification (PIV) program Proceedings of the second symposium on Usable privacy and security, (114-121)
- Paterson K and Yau A Cryptography in theory and practice Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques, (12-29)
- Jensen C and Connell P Trust-based route selection in dynamic source routing Proceedings of the 4th international conference on Trust Management, (150-163)
- Choi J and Mun Y Mechanism of the secure MAP discovery in hierarchical MIPv6 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II, (895-904)
- Chevassut O, Fouque P, Gaudry P and Pointcheval D The Twist-AUgmented technique for key exchange Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography, (410-426)
- Yang G, Wong D, Deng X and Wang H Anonymous signature schemes Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography, (347-363)
- Cheng Z, Chen L, Comley R and Tang Q Identity-based key agreement with unilateral identity privacy using pairings Proceedings of the Second international conference on Information Security Practice and Experience, (202-213)
- Yogender P and Ali H Impact of employing different security levels on QoS parameters in virtual private networks Proceedings of the 24th IASTED international conference on Parallel and distributed computing and networks, (142-149)
- Masuda S, Suzuki H, Okazaki N and Watanabe A Proposal for a practical cipher communication protocol that can coexist with NAT and firewalls Proceedings of the 2006 international conference on Information Networking: advances in Data Communications and Wireless Networks, (713-722)
- Smith J, González-Nieto J and Boyd C Modelling denial of service attacks on JFK with Meadows's cost-based framework Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54, (125-134)
- Jao D, Miller S and Venkatesan R Do all elliptic curves of the same order have the same difficulty of discrete log? Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security, (21-40)
- Di Raimondo M, Gennaro R and Krawczyk H Secure off-the-record messaging Proceedings of the 2005 ACM workshop on Privacy in the electronic society, (81-89)
- Di Raimondo M and Gennaro R New approaches for deniable authentication Proceedings of the 12th ACM conference on Computer and communications security, (112-121)
- Ciarletta L and Choi M Automatic configuration for VPN using active XML Proceedings of the 5th IEEE international conference on Operations and Management in IP-Based Networks, (173-180)
- Demerjian J, Hajjeh I, Badra M and Ferraz S A secure way to combine IPsec, NAT & DHCP Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security, (104-118)
- Jung S, Choi J, Kim Y and Kim S IPSec support in NAT-PT scenario for IPv6 transition Proceedings of the 8th international conference on Information Security, (194-202)
- Wang H, Zhang Y and Li Y Modeling for security verification of a cryptographic protocol with MAC payload Proceedings of the 2005 international conference on Advances in Intelligent Computing - Volume Part II, (538-547)
- Ontua M and Pancho-Festin S Evaluation of the unified modeling language for security requirements analysis Proceedings of the 6th international conference on Information Security Applications, (68-80)
- Krawczyk H HMQV Proceedings of the 25th annual international conference on Advances in Cryptology, (546-566)
- Yin H and Wang H Building an application-aware IPsec policy system Proceedings of the 14th conference on USENIX Security Symposium - Volume 14, (21-21)
- Lim J, Han M and Kim K Application of IKE protocol for IPsec VPN into embedded system Proceedings of the 9th WSEAS International Conference on Communications, (1-5)
- Gilaberte R and Herrero L IP addresses configuration in spontaneous networks Proceedings of the 9th WSEAS International Conference on Computers, (1-6)
- Aura T, Nagarajan A and Gurtov A Analysis of the HIP base exchange protocol Proceedings of the 10th Australasian conference on Information Security and Privacy, (481-493)
- Schütz S, Eggert L, Schmid S and Brunner M (2005). Protocol enhancements for intermittently connected hosts, ACM SIGCOMM Computer Communication Review, 35:3, (5-18), Online publication date: 1-Jul-2005.
- Imamoto K and Sakurai K (2005). Design and Analysis of Diffie-Hellman-Based Key Exchange Using One-time ID by SVO Logic, Electronic Notes in Theoretical Computer Science (ENTCS), 135:1, (79-94), Online publication date: 1-Jul-2005.
- Shin S, Kobara K and Imai H A lower-bound of complexity for RSA-Based password-authenticated key exchange Proceedings of the Second European conference on Public Key Infrastructure, (191-205)
- Lee Y, Choi E and Min D An authenticated key exchange mechanism using one-time shared key Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II, (187-194)
- Ferrante A, Piuri V and Castanier F A QoS-enabled packet scheduling algorithm for IPSec multi-accelerator based systems Proceedings of the 2nd conference on Computing frontiers, (221-229)
- Datta A, Derek A, Mitchell J and Pavlovic D (2005). A derivation system and compositional logic for security protocols, Journal of Computer Security, 13:3, (423-482), Online publication date: 1-May-2005.
- Rhee Y Secure initialization vector transmission on IP security Proceedings of the 4th international conference on Networking - Volume Part II, (852-858)
- Zúquete A (2005). An efficient high quality random number generator for multi-programmed systems, Journal of Computer Security, 13:2, (243-263), Online publication date: 1-Mar-2005.
- Hansen S, Skriver J and Nielson H Using static analysis to validate the SAML single sign-on protocol Proceedings of the 2005 workshop on Issues in the theory of security, (27-40)
- Boyd C Design of secure key establishment protocols Proceedings of the 5th international conference on Cryptology in India, (1-13)
- Bhargavan K, Corin R, Fournet C and Gordon A Secure sessions for web services Proceedings of the 2004 workshop on Secure web service, (56-66)
- Conrad M, Fuhrmann T, Schöller M and Zitterbart M Secure service signaling and fast authorization in programmable networks Proceedings of the 6th IFIP TC6 international working conference on Active networks, (66-77)
- Diament T, Lee H, Keromytis A and Yung M The dual receiver cryptosystem and its applications Proceedings of the 11th ACM conference on Computer and communications security, (330-343)
- Molnar D and Wagner D Privacy and security in library RFID Proceedings of the 11th ACM conference on Computer and communications security, (210-219)
- Xu S and Yung M k-anonymous secret handshakes with reusable credentials Proceedings of the 11th ACM conference on Computer and communications security, (158-167)
- Park S, Nah J and Chung K The implementation of IPsec-Based internet security system in IPv4/IPv6 network Proceedings of the 13th international conference on AI, Simulation, and Planning in High Autonomy Systems, (109-116)
- Imamoto K and Sakurai K Key-exchange protocol using pre-agreed Session-ID Proceedings of the 5th international conference on Information Security Applications, (375-387)
- Hong K, Jung S, Lo Iacono L and Ruland C Impacts of security protocols on real-time multimedia communications Proceedings of the 5th international conference on Information Security Applications, (1-13)
- Liu D, Chi C and Li M Normalizing Traffic Pattern with Anonymity for Mission Critical Applications Proceedings of the 37th annual symposium on Simulation
- Kanda M, Miyazawa K and Esaki H USAGI IPv6 IPsec Development for Linux Proceedings of the 2004 Symposium on Applications and the Internet-Workshops (SAINT 2004 Workshops)
- Herzberg A and Mass Y (2004). Relying Party Credentials Framework, Electronic Commerce Research, 4:1-2, (23-39), Online publication date: 1-Jan-2004.
- Datta A, Derek A, Mitchell J and Pavlovic D Secure protocol composition Proceedings of the 2003 ACM workshop on Formal methods in security engineering, (11-23)
- Basin D, Mödersheim S and Viganò L CDiff Proceedings of the 10th ACM conference on Computer and communications security, (335-344)
- Kaufman C, Perlman R and Sommerfeld B DoS protection for UDP-based protocols Proceedings of the 10th ACM conference on Computer and communications security, (2-7)
- Kasera S, Mizikovsky S, Sundaram G and Woo T On securely enabling intermediary-based services and performance enhancements for wireless mobile users Proceedings of the 2nd ACM workshop on Wireless security, (61-68)
- Choi M, Kwak D and Moon S A proposal for DoS-defensive internet key exchange Proceedings of the 2003 international conference on Computational science and its applications: PartII, (328-337)
- Balfanz D, Durfee G, Shankar N, Smetters D, Staddon J and Wong H Secret Handshakes from Pairing-Based Key Agreements Proceedings of the 2003 IEEE Symposium on Security and Privacy
- Sherman A and McGrew D (2003). Key Establishment in Large Dynamic Groups Using One-Way Function Trees, IEEE Transactions on Software Engineering, 29:5, (444-458), Online publication date: 1-May-2003.
- Bruschi D and Rosti E (2002). Secure multicast in wireless networks of mobile hosts, Mobile Networks and Applications, 7:6, (503-511), Online publication date: 1-Dec-2002.
- Aiello W, Bellovin S, Blaze M, Ioannidis J, Reingold O, Canetti R and Keromytis A Efficient, DoS-resistant, secure key exchange for internet protocols Proceedings of the 9th ACM conference on Computer and communications security, (48-58)
- Keromytis A, Misra V and Rubenstein D (2002). SOS, ACM SIGCOMM Computer Communication Review, 32:4, (61-72), Online publication date: 1-Oct-2002.
- Keromytis A, Misra V and Rubenstein D SOS Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications, (61-72)
- Miltchev S, Ioannidis S and Keromytis A A Study of the Relative Costs of Network Security Protocols Proceedings of the FREENIX Track: 2002 USENIX Annual Technical Conference, (41-48)
- Sanchez E and Edwards R Optimization of the Establishment of Secure Communication Channels in Wireless Mobile Networks Proceedings of the 16th International Parallel and Distributed Processing Symposium
- Braun T and Danzeisen M Secure Mobile IP Communication Proceedings of the 26th Annual IEEE Conference on Local Computer Networks
- Meadows C and Syverson P Formalizing GDOI group key management requirements in NPATRL Proceedings of the 8th ACM conference on Computer and Communications Security, (235-244)
- Hunt R (2001). Tutorial, Computer Communications, 24:14, (1460-1471), Online publication date: 1-Sep-2001.
- Gleitz P and Bellovin S Transient addressing for related processes Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
- Perrig A, Szewczyk R, Wen V, Culler D and Tygar J SPINS Proceedings of the 7th annual international conference on Mobile computing and networking, (189-199)
- Hardjono T, Baugher M and Harney H Group security association (GSA) management in IP multicast Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge, (213-228)
- O'Shea G and Roe M (2001). Child-proof authentication for MIPv6 (CAM), ACM SIGCOMM Computer Communication Review, 31:2, (4-8), Online publication date: 1-Apr-2001.
- Cheng P (2001). An architecture for the internet key exchange protocol, IBM Systems Journal, 40:3, (721-746), Online publication date: 1-Mar-2001.
- Ioannidis S, Keromytis A, Bellovin S and Smith J Implementing a distributed firewall Proceedings of the 7th ACM conference on Computer and Communications Security, (190-199)
- Asokan N and Ginzboorg P (2000). Key agreement in ad hoc networks, Computer Communications, 23:17, (1627-1637), Online publication date: 1-Nov-2000.
- Zhou J (2000). Further analysis of the Internet key exchange protocol, Computer Communications, 23:17, (1606-1612), Online publication date: 1-Nov-2000.
- Sierra J and Shepherd S (2000). New phase 1 exchange mode for IKE framework, ACM SIGOPS Operating Systems Review, 34:4, (34-40), Online publication date: 1-Oct-2000.
- Smart M, Malan G and Jahanian F Defeating TCP/IP stack fingerprinting Proceedings of the 9th conference on USENIX Security Symposium - Volume 9, (17-17)
- Zhang Y and Singh B A multi-layer IPsec protocol Proceedings of the 9th conference on USENIX Security Symposium - Volume 9, (16-16)
- Borella M and Montenegro G RSIP Proceedings of the Workshop on Intelligence at the Network Edge, (3-3)
- Zao J, Gahm J, Troxel G, Condell M, Helinek P, Yuan N, Castineyra I and Kent S (1999). A public-key based secure mobile IP, Wireless Networks, 5:5, (373-390), Online publication date: 1-Oct-1999.
- de Raadt T, Hallqvist N, Grabowski A, Keromytis A and Provos N Cryptography in OpenBSD Proceedings of the annual conference on USENIX Annual Technical Conference, (33-33)
Recommendations
Implementing internet key exchange (IKE)
ATEC '00: Proceedings of the annual conference on USENIX Annual Technical ConferenceA key component of the IP Security architecture is the Internet Key Exchange protocol. IKE is invoked to establish session keys (and associated cryptographic and networking configuration) between two hosts across the network. IKE needs to authenticate ...