This document describes a protocol, named OAKLEY, by which two authenticated parties can agree on secure and secret keying material. The basic mechanism is the Diffie-Hellman key exchange algorithm.
RFC Downloads
Cited By
- Willemson J Creating a Decryption Proof Verifier for the Estonian Internet Voting System Proceedings of the 18th International Conference on Availability, Reliability and Security, (1-7)
- Adrian D, Bhargavan K, Durumeric Z, Gaudry P, Green M, Halderman J, Heninger N, Springall D, Thomé E, Valenta L, VanderSloot B, Wustrow E, Zanella-Béguelin S and Zimmermann P (2018). Imperfect forward secrecy, Communications of the ACM, 62:1, (106-114), Online publication date: 19-Dec-2018.
- Adrian D, Bhargavan K, Durumeric Z, Gaudry P, Green M, Halderman J, Heninger N, Springall D, Thomé E, Valenta L, VanderSloot B, Wustrow E, Zanella-Béguelin S and Zimmermann P Imperfect Forward Secrecy Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, (5-17)
- Kang S, Kim J and Hong M (2013). Go anywhere, Personal and Ubiquitous Computing, 17:5, (933-943), Online publication date: 1-Jun-2013.
- Cremers C Key exchange in IPsec revisited Proceedings of the 16th European conference on Research in computer security, (315-334)
- Merino P, García-Martínez A, Organero M and Kloos C Enabling practical IPsec authentication for the internet Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I, (392-403)
- Lim J, Han M and Kim K Application of IKE protocol for IPsec VPN into embedded system Proceedings of the 9th WSEAS International Conference on Communications, (1-5)
- Borisov N, Goldberg I and Brewer E Off-the-record communication, or, why not to use PGP Proceedings of the 2004 ACM workshop on Privacy in the electronic society, (77-84)
- Kaufman C, Perlman R and Sommerfeld B DoS protection for UDP-based protocols Proceedings of the 10th ACM conference on Computer and communications security, (2-7)
- Hardjono T, Baugher M and Harney H Group security association (GSA) management in IP multicast Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge, (213-228)
- Cheng P (2001). An architecture for the internet key exchange protocol, IBM Systems Journal, 40:3, (721-746), Online publication date: 1-Mar-2001.
- Zhou J (2000). Further analysis of the Internet key exchange protocol, Computer Communications, 23:17, (1606-1612), Online publication date: 1-Nov-2000.
- Perkins C (2000). Mobile IP and the IETF, ACM SIGMOBILE Mobile Computing and Communications Review, 4:2, (8-13), Online publication date: 1-Apr-2000.
- Bentley D, Rose G and Whalen T ssmail: Opportunistic Encryption in sendmail Proceedings of the 13th USENIX conference on System administration, (1-8)
- Mittra S and Woo T (2019). A flow-based approach to datagram security, ACM SIGCOMM Computer Communication Review, 27:4, (221-234), Online publication date: 1-Oct-1997.
- Mittra S and Woo T A flow-based approach to datagram security Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication, (221-234)
- Atkinson R (1997). Toward a More Secure Internet, Computer, 30:1, (57-61), Online publication date: 1-Jan-1997.
- Perkins C and Johnson D Mobility support in IPv6 Proceedings of the 2nd annual international conference on Mobile computing and networking, (27-37)
- Caronni G, Lubich H, Aziz A, Markson T and Skrenta R SKIP-securing the Internet Proceedings of the 5th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'96)
Recommendations
Security of Indirect-Authenticated Key Exchange Protocol
IIH-MSP '09: Proceedings of the 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal ProcessingSecurity issues play an important role in modern communication worlds. Via distrusted networks, exchanged messages need to be encrypted by a session key for security requirements. Session keys are preferred to be generated by communication parties, and ...
Authenticated Key Exchange Protocol in One-Round
ICA3PP '09: Proceedings of the 9th International Conference on Algorithms and Architectures for Parallel ProcessingThe Key-exchange protocol is one of the most basic and widely used cryptographic protocols in internet for secure communication. In a two-party setting, cryptographic protocol design has often ignored the possibility of <em>simultaneous </em> message ...