首页 | 本学科首页   官方微博 | 高级检索  
     检索      

Two Modifications on IKE Protocol with Pre-shared Key Authentication
作者姓名:刘东喜  张连华  白英彩
作者单位:Dept.ofComputerScienceandEng.,ShanghaiJiaotongUniv.,Shanghai200030,China
摘    要:This paper proposed two modifications on IKE protocol with pre-shared key authentication. The first modification can improve its immunity against DDoS attack by authenticating the initiator before the responder generates the computation-intensive Diffie-Hellman public value. The second modification can improve its efficiency when the attack on messages occurs because it can detect the attack quickly by replacing the centralized authentication in origical IKE protocol with immediate authentication. In addition, the two modifications can be integrated into one protocol compactly.

关 键 词:光电摄像管  信息鉴别  鉴别规程  安全性  修订  计算机加强器  病毒  资源共享

Two Modifications on IKE Protocol with Pre-shared Key Authentication
LIU Dong-xi,ZHANG Lian-hua ,BAI Ying-cai.Two Modifications on IKE Protocol with Pre-shared Key Authentication[J].Journal of Shanghai Jiaotong university,2003,8(2):142-145.
Authors:LIU Dong-xi  ZHANG Lian-hua  BAI Ying-cai
Institution:Dept. of Computer Science and Eng. , Shanghai Jiaotong Univ. , Shanghai 200030, China
Abstract:This paper proposed two modifications on IKE protocol with pre-shared key authentication. The first modification can improve its immunity against DDoS attack by authenticating the initiator before the responder generates the computation-intensive Diffie-Hellman public value. The second modification can improve its efficiency when the attack on messages occurs because it can detect the attack quickly by replacing the centralized authentication in origical IKE protocol with immediate authentication. In addition, the two modifications can be integrated into one protocol compactly.
Keywords:IKE protocol  message authentication  authenticated key agreement
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号