Browse > Article
http://dx.doi.org/10.5762/KAIS.2010.11.4.1260

IPSec Key Recovery for IKEv2  

Rhee, Yoon-Jung (Dept. of Computer Science and Statistics, Jeju National University)
Kim, Chul-Soo (Dept. of Computer Science and Statistics, Jeju National University)
Lee, Bong-Gyu (Dept. of Computer Science and Statistics, Jeju National University)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.11, no.4, 2010 , pp. 1260-1265 More about this Journal
Abstract
IPSec is the security protocol that do encryption and authentication service to IP messages on network layer of the internet. This paper presents the key recovery mechanism that is applied to IKEv2 of IPSec for mobile communication environments. It results to have compatibility with IPSec and IKEv2, reduce network overhead, and perform key recovery without depending on key escrew agencies or authorized party.
Keywords
IPSec; Key Recovery; IKEv2;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Y.J.Rhee,T.Y.Kim, ""Practical Solutions to Key Recovery Based on PKI in IP Security"", SAFECOMP 2002, LNCS 2434, pp. 44-52, 2002.
2 The Internet Key Exchange (IKE) (RFC 2409)
3 Internet Security Association and Key Management Protocol (ISAKMP) (RFC 2408)
4 The Oakley Key Determination Protocol (RFC 2412)
5 IP Authentication Header (AH) (RFC 2402)
6 IP Encapsulating Security Payload (ESP) (RFC 2406)
7 NIST, "Escrow Encryption Standard (EES)", Federal Information Processing Standard Pubilication (FIPS PUB) 185, 1994.
8 H. Abelson, R. Anderson, S. Bellovin, J. Benaloh, M. Blaze, W. Diffie, J. Gilmore, P.Neumann, R. Rivest, J. Schiller, and B. Schneirer, "The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption",Technical report, 1997. Available from http://www.crypto.com/key-study.
9 N. Jefferies, C. Mitchell, and M. Walker, "A Proposed Architecture for Trusted Third Party Services", in Cryptography: Policy and Algorithms, Proceedings: International Conference BrisAne, Lecture Notes In Computer Science, LNCS 1029, Springer-Verlag, 1995.
10 T. Markham and C. Williams, "Key Recovery Header for IPSEC", Computers & Security, 19, 2000, Elsevier Science.
11 이윤정, "IETF 표준 인터넷 프로토콜과 호환되는 TTP 기반 키 복구", 한국콘텐츠학회논문지 6권 6호, pp. 56-63, 2006. 6
12 D. Balenson and T. Markham, "ISAKMP Key Recovery Extensions", Computers & Security, 19, 2000, Elsevier Science.
13 Su Rui-dan, Che Xiang-quan,Fu Shao-feng, Li Long-hai, Zhou Li-hua, ""Protocol-Based Hidden Key Recovery: IBE Approach and IPSec Case"", International Conference on Networks Security, Wireless Communications and Trusted Computing p . 719-723 2009.
14 Internet Key Exchange Protocol (IKEv2) (RFC4306) http://www.ietf.org/rfc/rfc4306.txt.