The Techniques of Based Internet Key Exchange (IKE) Protocol to Secure Key Negotiation | ||
IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING | ||
Article 14, Volume 22, Issue 3, September 2022, Pages 147-154 PDF (957.11 K) | ||
Document Type: Research Paper | ||
DOI: https://doi.org/10.33103/uot.ijccce.22.3.14 | ||
Authors | ||
Zainab Kareem Mahyob* 1; Raheem AbdulSahib Ogla2; Suhiar Mohammed Zeki3 | ||
1computer science/university of technology | ||
2Computer Sciences Department /University of Technology, Baghdad, Iraq | ||
3Computer Sciences Department, University of Technology, Baghdad, Iraq | ||
Abstract | ||
The Internet is a massive network that connects millions of users from all over the world and the data transmitted via it needs great protection, especially since that are in the age of big data. To solve part of this problem, IPsec was utilized, which is a set of protocols necessary to offer security to units of the Internet in general and the IP layer in particular. It is mostly based on major exchange protocols. The most frequent mechanism for transferring key materials and establishing security linkages between two entities is Internet Key Exchange (IKE). In the present work, it is proposed to use a public key that works together with Diffie-Hellman cryptography and the main advantages of a single-stage contribution (as opposed to the two-stage in standard IKE) it is better in terms of improved transfer and time (more time for the corresponding negotiation) to make the proposed IKE more secure with Simple account constraints | ||
Keywords | ||
IPsec; Internet Key Exchange (IKE) protocol; Security Association (SA) | ||
Statistics Article View: 104 PDF Download: 76 |