Abstract
Internet Key Exchange (IKE) is the default automated key management protocol selected for use with Internet Protocol Security protocol. The IKE has been implemented a lot but it has been critized whole the time. The scalability of the IKE is a question to be analyzed more seriously and that is the main issue of this paper. This paper presents estimations on the effort of the IKE negotiation using two different cases. The estimation is done theoretically but there are also concrete packet sizes and transmission times counted. The estimation introduces a scenario where a user needs a secure connection to some application server.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Jäälinoja Sanna: The Core of the Internet Key Exchange Protocol, Nordsec’2000 conference 12.–13.10.2000,Reykjavik, pp. 207–221.
Jäälinoja Sanna: Aspects of Cryptography and Internet Security, M.Sc. thesis, 1999, Oulu.
Oppliger Rolf: Internet and Intranet Security, 1998, Artech House, Inc.
D. Harkins, D. Carrel: The Internet Key Exchange (IKE), Request for Comments (RFC) 2409, Network Working Group, 1998, Internet: ftp://ftp.isi.edu/in-notes/rfc2409.txt
Menezes Alfred J., van Oorschot Paul C., Vanstone Scott A.: Handbook of Applied Cryptography, CRC Press, Inc, New York, 1997.
Mähönen Petri: Tulevaisuuden mobiilit dataverkot, 2000, Internet: http://www.tietokone.fi/lukusali/artikkelit/2000tk08/DATAVERKOT.HTM
Maughan D., Schertler M., Schneider M., Turner J.: (1998) Internet Security Association and Key Management Protocol (ISAKMP), Request for Comments (RFC) 2408, Network Working Group, 1998, Internet: ftp://ftp.isi.edu/in-notes/rfc2408.txt
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kunnari, S. (2001). Estimating the Scalability of the Internet Key Exchange. In: Qing, S., Okamoto, T., Zhou, J. (eds) Information and Communications Security. ICICS 2001. Lecture Notes in Computer Science, vol 2229. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45600-7_32
Download citation
DOI: https://doi.org/10.1007/3-540-45600-7_32
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42880-0
Online ISBN: 978-3-540-45600-1
eBook Packages: Springer Book Archive