IPsec: IKE (Internet Key Exchange)
Charlie Kaufman, Microsoft Corporation
Introduction
IKE Usage Scenarios
Gateway to Gateway
End Point to Gateway
End Point to End Point
IKE Protocol Handshake
Authentication Keys
Initial Diffie-Hellman Exchange
Negotiation of Cryptographic Algorithms
Identity Hiding
Negotiation of Traffic Selectors
Extensions and Variations
Denial of Service Protection
Extended Authentication Protocol
NAT Traversal
Differences Between IKEv1 and IKEv2
Two Phases
IKEv1 Handshake
Glossary
Cross References
References
Further Reading
INTRODUCTION
The IPsec (Internet Protocol Security) protocol cryptographically protects messages sent over the Internet on a packet-by-packet basis, as opposed to other protocols such as secure sockets layer (SSL) or secure multipurpose Internet e-mail extension (S/MIME) that encrypt larger messages before breaking them into packets. The major advantage of the IPsec approach is that it can be done transparently to applications. It can be done by the underlying operating system—or even by an external networking device—without making any changes to applications. IPsec is commonly used to tunnel messages between two trusted networks over an untrusted network, where the ultimate sending and receiving machines are not aware of any cryptographic processing.
In order that the IPsec end points be able to protect messages cryptographically, they must agree on which cryptographic algorithms and keys to use. To detect and discard long delayed and ...
Get Handbook of Information Security, Volume 1, Key Concepts, Infrastructure, Standards, and Protocols now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.