skip to main content
RFC2412: The OAKLEY Key Determination Protocol1998 RFC
Publisher:
  • RFC Editor
  • United States
Published:01 November 1998
Bibliometrics
Skip Abstract Section
Abstract

This document describes a protocol, named OAKLEY, by which two authenticated parties can agree on secure and secret keying material. The basic mechanism is the Diffie-Hellman key exchange algorithm.

RFC Downloads

Cited By

  1. ACM
    Willemson J Creating a Decryption Proof Verifier for the Estonian Internet Voting System Proceedings of the 18th International Conference on Availability, Reliability and Security, (1-7)
  2. ACM
    Adrian D, Bhargavan K, Durumeric Z, Gaudry P, Green M, Halderman J, Heninger N, Springall D, Thomé E, Valenta L, VanderSloot B, Wustrow E, Zanella-Béguelin S and Zimmermann P (2018). Imperfect forward secrecy, Communications of the ACM, 62:1, (106-114), Online publication date: 19-Dec-2018.
  3. ACM
    Adrian D, Bhargavan K, Durumeric Z, Gaudry P, Green M, Halderman J, Heninger N, Springall D, Thomé E, Valenta L, VanderSloot B, Wustrow E, Zanella-Béguelin S and Zimmermann P Imperfect Forward Secrecy Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, (5-17)
  4. Kang S, Kim J and Hong M (2013). Go anywhere, Personal and Ubiquitous Computing, 17:5, (933-943), Online publication date: 1-Jun-2013.
  5. Cremers C Key exchange in IPsec revisited Proceedings of the 16th European conference on Research in computer security, (315-334)
  6. Merino P, García-Martínez A, Organero M and Kloos C Enabling practical IPsec authentication for the internet Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I, (392-403)
  7. Lim J, Han M and Kim K Application of IKE protocol for IPsec VPN into embedded system Proceedings of the 9th WSEAS International Conference on Communications, (1-5)
  8. ACM
    Borisov N, Goldberg I and Brewer E Off-the-record communication, or, why not to use PGP Proceedings of the 2004 ACM workshop on Privacy in the electronic society, (77-84)
  9. ACM
    Kaufman C, Perlman R and Sommerfeld B DoS protection for UDP-based protocols Proceedings of the 10th ACM conference on Computer and communications security, (2-7)
  10. Hardjono T, Baugher M and Harney H Group security association (GSA) management in IP multicast Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge, (213-228)
  11. Cheng P (2001). An architecture for the internet key exchange protocol, IBM Systems Journal, 40:3, (721-746), Online publication date: 1-Mar-2001.
  12. Zhou J (2000). Further analysis of the Internet key exchange protocol, Computer Communications, 23:17, (1606-1612), Online publication date: 1-Nov-2000.
  13. ACM
    Perkins C (2000). Mobile IP and the IETF, ACM SIGMOBILE Mobile Computing and Communications Review, 4:2, (8-13), Online publication date: 1-Apr-2000.
  14. Bentley D, Rose G and Whalen T ssmail: Opportunistic Encryption in sendmail Proceedings of the 13th USENIX conference on System administration, (1-8)
  15. ACM
    Mittra S and Woo T (2019). A flow-based approach to datagram security, ACM SIGCOMM Computer Communication Review, 27:4, (221-234), Online publication date: 1-Oct-1997.
  16. ACM
    Mittra S and Woo T A flow-based approach to datagram security Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication, (221-234)
  17. Atkinson R (1997). Toward a More Secure Internet, Computer, 30:1, (57-61), Online publication date: 1-Jan-1997.
  18. ACM
    Perkins C and Johnson D Mobility support in IPv6 Proceedings of the 2nd annual international conference on Mobile computing and networking, (27-37)
  19. Caronni G, Lubich H, Aziz A, Markson T and Skrenta R SKIP-securing the Internet Proceedings of the 5th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'96)
Contributors

Recommendations