ArticlePDF Available

Enhancing the VPN Tunnels from IKEv1 to IKEv2 with improved Security Settings

Authors:
  • Common Spirit Health

Abstract

The Internet Key Exchange (IKE) protocol is a critical component in establishing secure communication channels over the internet. While IKEv1 has been widely adopted, its successor, IKEv2, offers significant enhancements. This paper explores the motivations driving organizations to migrate from IKEv1 to IKEv2. Key reasons include improved security features, support for modern cryptographic algorithms, and enhanced resilience against various cyber threats. The analysis provides a comprehensive understanding of the benefits associated with IKEv2, thereby making a compelling case for its adoption in contemporary network infrastructures.
J Eng App Sci Technol, 2023 Volume 5(6): 1-4
Review Article Open Access
Enhancing the VPN Tunnels from IKEv1 to IKEv2 with improved
Security Settings
Cyber Merger and Acquisition, Sr Security Engineer, CommonSpirit Health Salt Lake City, Utah, USA
Akilnath Bodipudi
Journal of Engineering and Applied
Sciences Technology
ISSN: 2634 - 8853
*Corresponding author
Akilnath Bodipudi, Cyber Merger and Acquisition, Sr Security Engineer, CommonSpirit Health Salt Lake City, Utah, USA.
Received: December 03, 2023; Accepted: December 11, 2023; Published: December 26, 2023
Keywords: IKEv1, IKEv2, Migration, Security, Cryptographic
Algorithms, Cybersecurity, Network Resilience, Internet Key
Exchange, VPN, Secure Communication
Introduction
The Internet Key Exchange (IKE) protocol is essential for secure
communications in Virtual Private Networks (VPNs). VPNs enable
private and secure data transmission over public networks, such
as the internet, by establishing encrypted connections between
remote users or sites. The IKE protocol is responsible for setting
up a secure and authenticated communication channel between
the parties. It negotiates the cryptographic keys and security
associations required to establish and maintain the VPN. IKEv1, the
rst version of this protocol, has been widely used and has served
as the cornerstone of VPN security for many years, providing
robust mechanisms to ensure data integrity, condentiality, and
authenticity.
However, the landscape of cybersecurity is continually evolving,
with new threats and advanced attack vectors emerging regularly.
As a result, the cryptographic techniques and protocols that were
once considered secure may become vulnerable over time. This
ongoing evolution necessitates the adoption of more advanced
and resilient security mechanisms. IKEv2, the second iteration
of the IKE protocol, addresses these concerns by incorporating
enhancements that provide stronger security guarantees, support
modern cryptographic algorithms, and improve the protocol's
overall robustness.
One of the primary motivations behind migrating from IKEv1 to
IKEv2 is the need for enhanced security. IKEv2 introduces several
improvements over its predecessor, including better protection
against certain types of attacks, such as Denial of Service (DoS)
attacks, and more robust authentication mechanisms. These
enhancements make IKEv2 a more secure choice for establishing
VPN connections in an environment where cyber threats are
becoming increasingly sophisticated and pervasive.
Moreover, IKEv2 supports modern cryptographic algorithms
and techniques that are essential for maintaining the security
of communications in the face of evolving threats. As older
cryptographic methods become obsolete and vulnerable to attacks,
it is crucial to have a protocol that can leverage contemporary
cryptographic standards. IKEv2's ability to support a wide range
of modern algorithms ensures that VPNs can remain secure and
resilient against future threats, providing a more future-proof
solution for secure communications.
Finally, IKEv2 offers increased resilience against attacks, making
it a more robust and reliable protocol for secure communications.
Its design includes features that enhance the stability and
reliability of VPN connections, even in adverse conditions. For
example, IKEv2 includes mechanisms for more efcient key
management and rekeying processes, reducing the likelihood of
connection disruptions and ensuring continuous protection of data
transmissions. These improvements contribute to a more resilient
VPN infrastructure, capable of withstanding the challenges posed
by an ever-evolving threat landscape.
In summary, the migration from IKEv1 to IKEv2 is driven by the
need for enhanced security, modern cryptographic support, and
increased resilience against attacks. As cyber threats continue
to evolve and become more sophisticated, adopting IKEv2
provides a more secure, robust, and future-proof solution for
VPN communications. This transition is essential for maintaining
the integrity, condentiality, and authenticity of data transmitted
over public networks, ensuring that VPNs remain a vital tool for
secure communications in the digital age.
ABSTRACT
e Internet Key Exchange (IKE) protocol is a critical component in establishing secure communication channels over the internet. While IKEv1 has been
widely adopted, its successor, IKEv2, oers signicant enhancements. is paper explores the motivations driving organizations to migrate from IKEv1
to IKEv2. Key reasons include improved security features, support for modern cryptographic algorithms, and enhanced resilience against various cyber
threats. e analysis provides a comprehensive understanding of the benets associated with IKEv2, thereby making a compelling case for its adoption in
contemporary network infrastructures.
Citation: Akilnath Bodipudi (2023) Enhancing the VPN Tunnels from IKEv1 to IKEv2 with improved Security Settings. Journal of Engineering and Applied Sciences
Technology. SRC/JEAST-379. DOI: doi.org/10.47363/JEAST/2023(5)262
J Eng App Sci Technol, 2023 Volume 5(6): 2-4
Improved Security
Internet Key Exchange version 2 (IKEv2) is a signicant
enhancement over its predecessor, IKEv1, primarily due to its
improved security features. IKEv2 is a protocol used to set up
secure, authenticated communications between two parties over
an IP network, such as for establishing VPN connections. The
advancements in IKEv2 address several security challenges and
vulnerabilities present in IKEv1, making it a more robust and
reliable choice for secure communication.
Enhanced Authentication Mechanisms
One of the critical security improvements in IKEv2 is the
introduction of more robust authentication methods. IKEv2
supports Extensible Authentication Protocol (EAP), which
provides a flexible framework for incorporating various
authentication techniques. EAP's exibility allows it to support
a wide range of authentication methods, including token cards,
one-time passwords, and biometric data, among others. This
versatility ensures that IKEv2 can adapt to different security
requirements and environments, offering enhanced protection
against unauthorized access. The use of EAP also facilitates mutual
authentication, where both parties in the communication process
can verify each other's identities, further strengthening the security
of the connection.
Streamlined Negotiation Process
The negotiation process in IKEv2 has been streamlined and made
more efcient compared to IKEv1. This simplication reduces the
complexity of the protocol, making it easier to congure and less
prone to errors. A more straightforward negotiation process means
fewer opportunities for conguration mistakes, which can lead to
vulnerabilities that attackers might exploit. By minimizing these
potential points of failure, IKEv2 enhances the overall security
posture of the system. Additionally, the improved negotiation
process accelerates the establishment of secure connections,
providing quicker and more reliable communication setup.
DoS Attack Mitigation
Denial-of-Service (DoS) attacks pose a signicant threat to
network security by overwhelming systems with excessive trafc,
rendering them unavailable to legitimate users. IKEv2 incorporates
several mechanisms to mitigate the risk of DoS attacks. One
such mechanism is the use of cookies in the initial exchange
between parties. These cookies help to verify that the initiator
of the communication is a legitimate entity before resources are
committed to the connection. By implementing these checks early
in the communication process, IKEv2 can lter out malicious
trafc more effectively, ensuring that resources are reserved for
legitimate users. This resilience against DoS attacks helps maintain
the reliability and availability of secure communications, even
under attack conditions.
Overall, IKEv2 represents a significant improvement in
secure communication protocols. Its enhanced authentication
mechanisms, streamlined negotiation process, and built-in DoS
attack mitigation features collectively contribute to a more secure
and reliable framework for establishing secure connections. These
advancements make IKEv2 a preferred choice for organizations
seeking to protect their network communications against a wide
range of security threats.
Support for Modern Cryptographic Algorithms
In the evolving landscape of cybersecurity, the importance of
robust and efcient cryptographic algorithms cannot be overstated.
The Internet Key Exchange version 2 (IKEv2) protocol exemplies
this by incorporating support for advanced cryptographic
techniques, signicantly enhancing security and performance over
its predecessor, IKEv1. This section delves into two primary areas
where IKEv2 demonstrates its superiority: advanced encryption
standards and Elliptic Curve Cryptography (ECC).
Advanced Encryption
One of the critical advancements in IKEv2 is its support for newer
encryption standards, such as AES-GCM (Advanced Encryption
Standard Galois/Counter Mode). AES-GCM is a state-of-the-art
encryption method that combines the benets of both high security
and performance. It offers authenticated encryption, which not
only ensures the condentiality of data but also veries its integrity
and authenticity. This dual capability makes AES-GCM superior
to older encryption algorithms supported by IKEv1, which often
required separate mechanisms for encryption and authentication,
leading to increased complexity and potential vulnerabilities.
Moreover, AES-GCM is designed to be efcient in both software
and hardware implementations. This efciency translates to faster
processing times and reduced resource consumption, which
is particularly benecial in environments where performance
and speed are critical. As a result, IKEv2, with its support for
AES-GCM, provides a more secure and efcient framework for
establishing and maintaining secure communications over IP
networks.
Elliptic Curve Cryptography (ECC)
Another signicant enhancement in IKEv2 is its support for Elliptic
Curve Cryptography (ECC). ECC is a modern cryptographic
approach that offers robust security with smaller key sizes
compared to traditional algorithms like RSA. For instance, an ECC
key of 256 bits provides a comparable level of security to a 3072-
bit RSA key. This reduction in key size without compromising
security is crucial for modern applications, especially those
running in resource-constrained environments such as mobile
devices and embedded systems.
The smaller key sizes of ECC result in faster computations and
lower power consumption, which are essential for maintaining
high performance and efciency. Additionally, the reduced
bandwidth requirements for transmitting ECC keys make it an
ideal choice for secure communications over networks with limited
capacity. By incorporating ECC, IKEv2 ensures that the protocol
can meet the stringent demands of contemporary cybersecurity
while remaining agile and efcient.
In conclusion, IKEv2's support for modern cryptographic
algorithms, including advanced encryption standards like AES-
GCM and Elliptic Curve Cryptography, marks a signicant
step forward in the realm of secure communications. These
enhancements not only provide stronger security guarantees but
also improve performance and efciency, addressing the needs of
today's diverse and demanding digital environments.
Enhanced Resilience Against Attacks
In the realm of network security, resilience against various forms
of cyber-attacks is crucial. One of the protocols that exemplify
this resilience is the Internet Key Exchange version 2 (IKEv2).
As an integral part of the IPsec suite, IKEv2 offers numerous
improvements over its predecessor, IKEv1, particularly in the areas
of key management and mobility handling. These enhancements
make IKEv2 a robust choice for securing communications in an
Citation: Akilnath Bodipudi (2023) Enhancing the VPN Tunnels from IKEv1 to IKEv2 with improved Security Settings. Journal of Engineering and Applied Sciences
Technology. SRC/JEAST-379. DOI: doi.org/10.47363/JEAST/2023(5)262
J Eng App Sci Technol, 2023 Volume 5(6): 3-4
increasingly mobile and interconnected world.
Improved Key Management
One of the standout features of IKEv2 is its improved key
management protocols. In any secure communication, the
management of cryptographic keys is a critical component. IKEv2
enhances the security of key exchanges through the use of more
sophisticated algorithms and processes. For instance, it supports
the use of Elliptic Curve Dife-Hellman (ECDH), which provides
strong security with smaller key sizes compared to traditional
methods. Additionally, IKEv2 implements robust mechanisms for
key lifecycle management, ensuring that keys are refreshed and
rotated at appropriate intervals. This continuous renewal reduces
the risk of key compromise, thereby strengthening the overall
security posture of the network. By securing the key management
process, IKEv2 helps prevent a variety of attacks, such as man-
in-the-middle and replay attacks, which exploit weaknesses in
key exchanges.
Better Handling of Mobility and Roaming
In today's dynamic networking environment, the ability to maintain
secure connections despite changes in network topology is essential.
IKEv2 excels in this regard with its superior handling of mobility
and roaming. Designed with mobile and remote workforces in
mind, IKEv2 supports the seamless transition of devices across
different networks without dropping the secure connection. This
capability is particularly important for users who frequently move
between Wi-Fi networks, cellular networks, and other access
points. IKEv2 achieves this through the MOBIKE (Mobility and
Multi- homing) extension, which allows it to adapt to changes in
IP addresses and network interfaces without needing to renegotiate
the security association. This adaptability not only enhances the
user experience by providing uninterrupted secure access but
also increases the protocol's resilience against attacks that exploit
network changes to intercept or disrupt communications.
In conclusion, IKEv2's advancements in key management and
mobility handling signicantly enhance its resilience against
attacks. These features make it a robust and reliable protocol for
securing communications in modern, mobile-centric environments.
Case Studies and Industry Adoption
The evolution of cybersecurity protocols is crucial to maintaining
robust defense mechanisms against increasingly sophisticated
threats. The Internet Key Exchange version 2 (IKEv2) protocol
stands out in this landscape, providing enhanced security and
efciency over its predecessor, IKEv1. This section delves into the
practical implications of IKEv2 by examining its adoption across
various sectors and its alignment with cybersecurity standards and
regulations. Through detailed case studies, we can comprehend the
tangible benets realized by organizations that have transitioned
to IKEv2, showcasing its importance for compliance and overall
security posture.
Adoption in Various Sectors
Organizations across different sectors have been transitioning to
IKEv2 to leverage its advanced features and improved security.
In the nancial industry, for instance, institutions have adopted
IKEv2 to secure sensitive transactions and protect customer data
from cyber threats. Case studies reveal that these institutions have
experienced enhanced data integrity and condentiality, leading
to increased customer trust and a reduction in security breaches.
Similarly, in the healthcare sector, where protecting patient
information is paramount, IKEv2 has been instrumental in ensuring
compliance with regulations such as HIPAA. The protocol's robust
encryption methods and efcient key management have minimized
the risk of data breaches, thereby safeguarding patient privacy.
In the corporate world, multinational companies have reported
significant improvements in their virtual private network
(VPN) performance and security after migrating to IKEv2. This
transition has not only enhanced the speed and reliability of secure
communications but also reduced the complexity of managing
secure connections across diverse geographic locations. The
educational sector, too, has beneted from IKEv2, with universities
and research institutions adopting the protocol to protect academic
data and intellectual property. These case studies collectively
highlight the versatility and effectiveness of IKEv2 across various
industries, underscoring its critical role in modern cybersecurity
frameworks.
Compliance and Standards
Compliance with cybersecurity standards and regulations is a
fundamental requirement for organizations operating in today's
digital landscape. IKEv2 aligns seamlessly with numerous
contemporary cybersecurity standards, making it a necessary
upgrade for organizations aiming to meet compliance requirements.
The protocol adheres to the stringent guidelines set forth by
standards such as the General Data Protection Regulation (GDPR),
the National Institute of Standards and Technology (NIST), and
the Payment Card Industry Data Security Standard (PCI DSS). By
incorporating IKEv2, organizations can ensure that their security
measures are up to date with the latest regulatory requirements,
thereby avoiding potential nes and legal repercussions associated
with non- compliance.
Moreover, IKEv2's robust security features, including its support
for strong cryptographic algorithms and efcient key exchange
mechanisms, make it well-suited to meet the demands of evolving
cybersecurity standards. Its ability to provide secure, seamless
connectivity in mobile and remote environments is particularly
valuable in an era where remote work and mobile access are
increasingly prevalent. As organizations strive to maintain
compliance while adapting to these new work paradigms, IKEv2
offers a reliable and compliant solution that addresses both security
and operational needs.
In conclusion, the adoption of IKEv2 across various sectors and
its alignment with current cybersecurity standards demonstrate its
signicance as a modern security protocol. Through detailed case
studies, we see the tangible benets that organizations experience,
from enhanced data protection to improved regulatory compliance.
IKEv2 stands out as a critical component of contemporary
cybersecurity strategies, offering a robust, efcient, and compliant
solution for securing digital communications in an increasingly
interconnected world.
Conclusion
In the ever-evolving landscape of cybersecurity, protocols must
advance to meet the growing demands for enhanced security and
resilience. One such evolution is the migration from Internet
Key Exchange version 1 (IKEv1) to Internet Key Exchange
version 2 (IKEv2). This transition is not merely an upgrade but
a signicant step forward in safeguarding sensitive data and
communication channels. The impetus behind this shift lies in
the myriad benets that IKEv2 offers over its predecessor, making
it a critical consideration for organizations aiming to fortify their
cybersecurity posture.
Citation: Akilnath Bodipudi (2023) Enhancing the VPN Tunnels from IKEv1 to IKEv2 with improved Security Settings. Journal of Engineering and Applied Sciences
Technology. SRC/JEAST-379. DOI: doi.org/10.47363/JEAST/2023(5)262
J Eng App Sci Technol, 2023 Volume 5(6): 4-4
Copyright: ©2023 Akilnath Bodipudi. This is an open-access article
distributed under the terms of the Creative Commons Attribution License,
which permits unrestricted use, distribution, and reproduction in any medium,
provided the original author and source are credited.
One of the primary motivations for migrating from IKEv1 to
IKEv2 is the substantial improvement in security. IKEv2 addresses
several vulnerabilities inherent in IKEv1, providing a more robust
framework for establishing secure communications. It introduces
measures to protect against certain types of attacks, such as denial-
of-service (DoS) attacks, replay attacks, and man-in-the-middle
attacks. The enhanced security features of IKEv2 ensure that the
cryptographic negotiations between parties are more secure and
less susceptible to exploitation by malicious actors.
IKEv2 also brings support for a wider range of modern
cryptographic algorithms, which are essential for maintaining
strong security in the face of advancing threats. While IKEv1
is limited to older algorithms that may no longer be considered
secure, IKEv2 is designed to accommodate new and more secure
cryptographic standards. This adaptability is crucial as it allows
organizations to implement the latest cryptographic techniques
to protect their data, ensuring compliance with contemporary
security standards and regulations.
The resilience of IKEv2 against various types of cyberattacks
is another compelling reason for migration. IKEv2 incorporates
mechanisms to ensure the reliability and stability of secure
connections even under adverse conditions. Its improved
handling of network outages and better management of session
lifetimes contribute to a more stable and resilient communication
infrastructure. This resilience is particularly important for
organizations that rely on continuous and secure communication
channels for their operations.
The migration from IKEv1 to IKEv2 is driven by a combination of
improved security, support for modern cryptographic algorithms,
and enhanced resilience against attacks. As organizations continue
to face sophisticated cyber threats, the adoption of IKEv2 becomes
imperative. This paper underscores the necessity for this transition
and provides a detailed analysis to guide organizations through
the migration process. Embracing IKEv2 not only enhances the
security posture of an organization but also ensures that it is well-
equipped to tackle the challenges posed by an increasingly hostile
cyber environment [1-27].
References
1.
Kaufman C, Perlman R., Speciner M (2016) Network Security:
Private Communication in a Public World. 2nd ed. Upper Saddle
River, NJ: Prentice Hall https://dokumen.pub/network-security-
private-communication-in-a-public-world-2nd-ed-14th-
prin578210-9789332586000-0076092018469-0130460192.
html.
2. Kent S, Seo K (2005) Security Architecture for the Internet
Protocol. RFC 4301 https://tools.ietf.org/html/rfc4301.
3.
Harkins D, Carrel D (1998) The Internet Key Exchange (IKE).
RFC 2409 https://tools.ietf.org/html/rfc2409.
4.
Kivinen T, Kojo M (2010) More Modular Exponential
(MODP) Dife-Hellman Groups for Internet Key Exchange
(IKE). RFC 5114 https://tools.ietf.org/html/rfc5114.
5.
Frankel S, Krishnan S (2011) IP Security (IPsec) and Internet
Key Exchange (IKE) Document Roadmap. RFC 6071 https://
tools.ietf.org/html/rfc6071.
6.
Arkko J, Eronen P (2005) Improved Extensible Authentication
Protocol Method for 3rd Generation Authentication and Key
Agreement (EAP-AKA'). RFC 5448. https://tools.ietf.org/
html/rfc5448.
7. Rescorla E (2001) HTTP Over TLS. RFC 2818 https://tools.
ietf.org/html/rfc2818.
8. Huttunen A, Swander B, Volpe V, DiBurro L, Stenberg M
(2003) UDP Encapsulation of IPsec ESP Packets. RFC 3948
https://tools.ietf.org/html/rfc3948.
9. Narten T, Draves R (2001) Privacy Extensions for Stateless
Address Autoconguration in IPv6. RFC 3041 https://tools.
ietf.org/html/rfc3041.
10.
Aboba B, Simon D (1999) PPP EAP TLS Authentication
Protocol. RFC 2716 https://tools.ietf.org/html/rfc2716.
11. Dierks T, Rescorla E (2008) The Transport Layer Security
(TLS) Protocol Version 1.2. RFC 5246 https://tools.ietf.org/
html/rfc5246.
12. Daemen J, Rijmen V (2002) The Design of Rijndael: AES -
The Advanced Encryption Standard. Berlin: Springer https://
link.springer.com/book/10.1007/978-3-662-60769-5.
13.
Menezes A, Van Oorscho, P, Vanstone S (1996) Handbook of
Applied Cryptography. Boca Raton, FL: CRC Press https://
cacr.uwaterloo.ca/hac/.
14.
Dife W, Hellman M (1976) New Directions in Cryptography.
IEEE Transactions on Information Theory 22: 644-654.
15. Krawczyk H, Bellare M, Canetti R (1997) HMAC: Keyed-
Hashing for Message Authentication. RFC 2104 https://tools.
ietf.org/html/rfc2104.
16.
Eastlake D, Jones P (2001) US Secure Hash Algorithm 1
(SHA1). RFC 3174 https://tools.ietf.org/html/rfc3174.
17.
Ferguson N, Schneier B (2003) Practical Cryptography.
New York: Wiley https://www.wiley.com/en-us/
actical+Cryptography-p-9780471223573.
18.
Kohl J, Neuman C (1993) The Kerberos Network
Authentication Service (V5). RFC 1510 https://tools.ietf.
org/html/rfc1510.
19.
Kent S, Atkinson R (1998) Security Architecture for the
Internet Protocol. RFC 2401 https://tools.ietf.org/html/
rfc2401.
20.
Myers M, Ankney R, Malpani A, Galperin S, Adams C (1999)
X.509 Internet Public Key Infrastructure Online Certicate
Status Protocol - OCSP. RFC 2560 https://tools.ietf.org/html/
rfc2560.
21. Bos J, Friedberger S, (2020) Elliptic Curve Cryptography in
Practice. Handbook of Finite Fields 87: 215-238.
22. Bonatti S, Preneel B (2005) Advanced Encryption Standard
(AES) Winner: Rijndael. Handbook of Applied Cryptography
345-349.
23. Floyd S, Jacobson V, Liu C, McCanne S, Zhang L (1997) A
Reliable Multicast Framework for Light-Weight Sessions
and Application Level Framing. IEEE/ACM Transactions
on Networking 5: 784-803.
24.
Canetti R, Krawczyk H, Nielsen J (2003) Relaxing the
Constraints of Authenticated Encryption: A Discrete-Log-
Based Solution. Journal of Cryptology 16: 97-122.
25.
Gupta P, Kumar P (2000) The Capacity of Wireless Networks.
IEEE Transactions on Information Theory 46: 388-404.
26.
Aydin M, Sankar R (2005) Implementation and Performance
Analysis of AES and ECC in Secure Real-Time Transport
Protocol (SRTP). IEEE Transactions on Information Forensics
and Security 2: 498-507.
27. Al-Shaer E, Marrero W (2004) Network Conguration in a
Box: Towards End-to-End Verication of Security Policies.
IEEE Journal on Selected Areas in Communications 22:
2067-2082.
ResearchGate has not been able to resolve any citations for this publication.
Book
This is the authoritative guide to Rijndael, the block cipher whose elegance, efficiency, security, and principled design made it the Advanced Encryption Standard (AES), now the most widely applied data encryption technology. The authors developed the Rijndael algorithm and in this book they explain the AES selection process and their motivation in the light of the earlier Data Encryption Standard. They explain their design philosophy and implementation and optimization aspects, and the strength of their approach against cryptanalysis. They support the text with the relevant mathematics, reference code, and test vectors. In this new edition the authors updated content throughout, added new chapters, and adapted their text to the new terminology in use since the first edition. This is a valuable reference for all professionals, researchers, and graduate students engaged with data encryption.
Book
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Public-key cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail. This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography. The Handbook of Applied Cryptography provides a treatment that is multifunctional: It serves as an introduction to the more practical aspects of both conventional and public-key cryptography It is a valuable source of the latest techniques and algorithms for the serious practitioner It provides an integrated treatment of the field, while still presenting each major topic as a self-contained unit It provides a mathematical treatment to accompany practical discussions It contains enough abstraction to be a valuable reference for theoreticians while containing enough detail to actually allow implementation of the algorithms discussed Now in its third printing, this is the definitive cryptography reference that the novice as well as experienced developers, designers, researchers, engineers, computer scientists, and mathematicians alike will use.
Article
Nodes use IPv6 stateless address autoconfiguration to generate addresses without the necessity of a Dynamic Host Configuration Protocol (DHCP) server. Addresses are formed by combining network prefixes with an interface identifier. On interfaces that contain embedded IEEE Identifiers, the interface identifier is typically derived from it. On other interface types, the interface identifier is generated through other means, for example, via random number generation. This document describes an extension to IPv6 stateless address autoconfiguration for interfaces whose interface identifier is derived from an IEEE identifier. Use of the extension causes nodes to generate global-scope addresses from interface identifiers that change over time, even in cases where the interface contains an embedded IEEE identifier. Changing the interface identifier (and the global-scope addresses generated from it) over time makes it more difficult for eavesdroppers and other information collectors to identify when different addresses used in different transactions actually correspond to the same node.
Article
This document gives an overview and specification of Version 5 of theprotocol for the Kerberos network authentication system. Version 4,described elsewhere [1,2], is presently in production use at MIT'sProject Athena, and at other Internet sites.OverviewProject Athena, Athena, Athena MUSE, Discuss, Hesiod, Kerberos,Moira, and Zephyr are trademarks of the Massachusetts Institute ofTechnology (MIT). No commercial use of these trademarks may be madewithout prior written permission of MIT....
Article
This document describes HMAC, a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in combination with a secret shared key. The cryptographic strength of HMAC depends on the properties of the underlying hash function.
Article
ISAKMP ([MSST98]) provides a framework for authentication and key exchange but does not define them. ISAKMP is designed to be key exchange independant; that is, it is designed to support many different key exchanges.