메뉴 건너뛰기




Volumn 2197, Issue , 2012, Pages 530-535

Establishment of ECC-based initial secrecy usable for IKE implementation

Author keywords

Certificate authority (CA); Elliptic curve cryptography (ECC); Internet key exchange (IKE) protocol; Internet security association; Key management protocol (ISAKMP); Security association (SA)

Indexed keywords

GEOMETRY; PUBLIC KEY CRYPTOGRAPHY; SECURITY SYSTEMS;

EID: 85016055245     PISSN: 20780958     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (7)

References (33)
  • 1
    • 0034315483 scopus 로고    scopus 로고
    • Further analysis of the internet key exchange protocol
    • J. Zhou, “Further analysis of the Internet key exchange protocol”, Computer Communications, 23, 2000, pp. 1606-1612.
    • (2000) Computer Communications , vol.23 , pp. 1606-1612
    • Zhou, J.1
  • 3
    • 0003068282 scopus 로고    scopus 로고
    • Security architecture for the internet protocol
    • November
    • S. Kent and R. Atkinson, “Security Architecture for the Internet Protocol,” RFC 2401, November 1998.
    • (1998) RFC 2401
    • Kent, S.1    Atkinson, R.2
  • 4
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key exchange protocols and their use for building secure channels
    • Springer-Verlag, Berlin/Heidelberg, LNCS
    • R. Canetti, H. Krawczyk. “Analysis of key exchange protocols and their use for building secure channels”, In Proc. Of Advances in Cryptology-Eurocrypt’01, Springer-Verlag, Berlin/Heidelberg, 2001, 453-474, LNCS.
    • (2001) Proc. Of Advances in Cryptology-Eurocrypt’01 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 5
    • 84867988176 scopus 로고    scopus 로고
    • An internet key exchange protocol based on public key infrastructure
    • English Edition
    • ZHU Jian-ming, MA Jian-feng. An Internet Key Exchange Protocol Based on Public Key Infrastructure, Journal of Shanghai University (English Edition), 2004
    • (2004) Journal of Shanghai University
    • Zhu, J.-M.1    Ma, J.-F.2
  • 6
    • 0003272021 scopus 로고    scopus 로고
    • The internet key exchange (IKE)
    • November
    • D. Harkins and D. Carrel, “The Internet Key Exchange (IKE),” RFC 2409, November 1998.
    • (1998) RFC 2409
    • Harkins, D.1    Carrel, D.2
  • 7
    • 0034315111 scopus 로고    scopus 로고
    • Key exchange in IPSec: Analysis of IKE
    • November-December
    • Radia Perlman and Charlie Kaufman, “Key Exchange in IPSec: Analysis of IKE,” IEEE Internet Computing, November-December, 2000, pp. 50-56.
    • (2000) IEEE Internet Computing , pp. 50-56
    • Perlman, R.1    Kaufman, C.2
  • 8
    • 0034227286 scopus 로고    scopus 로고
    • Methods and protocols for secure key negotiation using IKE
    • July-August
    • Michael S. Borella, “Methods and Protocols for Secure Key Negotiation Using IKE,” IEEE Networks, July-August 2000, pp. 18-29.
    • (2000) IEEE Networks , pp. 18-29
    • Borella, M.S.1
  • 14
    • 0003294637 scopus 로고    scopus 로고
    • The OAKLEY key determination protocol
    • H. Orman, “The OAKLEY Key Determination Protocol,” RFC 2412, 1998.
    • (1998) RFC 2412
    • Orman, H.1
  • 15
    • 0003357112 scopus 로고    scopus 로고
    • Internet security association and key management protocol (ISAKMP)
    • D. Maughan et al., “Internet Security Association and Key Management Protocol (ISAKMP),” RFC 2408, 1998.
    • (1998) RFC 2408
    • Maughan, D.1
  • 16
    • 0035311761 scopus 로고    scopus 로고
    • Key agreement protocols resistant to a denial-to-service
    • April
    • S. Hirose and K. Matsuura, “Key Agreement Protocols Resistant to a Denial-to-Service,” IEICE Trans. On Information and Systems, April 2001, pp. 477-484.
    • (2001) IEICE Trans. On Information and Systems , pp. 477-484
    • Hirose, S.1    Matsuura, K.2
  • 19
    • 80051478062 scopus 로고    scopus 로고
    • A protocol for internet key exchange (IKE) using public encryption key and public signature key
    • July
    • V. Nagalakshmi and I. Rameshbabu, “A protocol for internet key exchange (IKE) using public encryption key and public signature key”, International Journal of Computer Science and Network Security, vol. 7, No. 7, July 2007, pp. 342-346.
    • (2007) International Journal of Computer Science and Network Security , vol.7 , Issue.7 , pp. 342-346
    • Nagalakshmi, V.1    Rameshbabu, I.2
  • 24
    • 0000112683 scopus 로고
    • Elliptic curve cryptosystem
    • Janaury
    • N Koblitz. “Elliptic Curve Cryptosystem”. Journal of mathematics computation, Janaury 1987, 48(177):203-2009.
    • (1987) Journal of Mathematics Computation , vol.48 , Issue.177 , pp. 203-2009
    • Koblitz, N.1
  • 25
    • 0000838441 scopus 로고
    • Use of elliptic curves in cryptography
    • LNCS 218
    • V Miller. “Use of elliptic curves in cryptography”. Advances in Cryptology-CRYPTO, 85 (LNCS 218), 1985:417-426.
    • (1985) Advances in Cryptology-CRYPTO , vol.85 , pp. 417-426
    • Miller, V.1
  • 27
    • 84892506781 scopus 로고    scopus 로고
    • Design of improved password authentication and update scheme based on elliptic curve cryptography
    • press
    • SK Hafizul Islam and G. P. Biswas, “Design of improved password authentication and update scheme based on elliptic curve cryptography”, Mathematical and Computer Modeling (2011), doi:10.1016/j.mcm.2011.07.001, in press.
    • (2011) Mathematical and Computer Modeling
    • Hafizul Islam, S.K.1    Biswas, G.P.2
  • 28
    • 29144489246 scopus 로고    scopus 로고
    • Public key infrastructure overview
    • Sun Blue Prints™ Online August
    • J. Weise, ‘Public Key Infrastructure Overview’, Sun PSSM Global Security Practice, Sun Blue Prints™ Online - August 2001.
    • (2001) Sun PSSM Global Security Practice
    • Weise, J.1
  • 31
    • 77951284170 scopus 로고    scopus 로고
    • Algorithms and identifiers for the internet x.509 public key infrastructure certificate and certificate revocation list (CRL) profile
    • April
    • W. Polk, R. Housley and L. Bassham, “Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile”, RFC 3279, April 2002.
    • (2002) RFC 3279
    • Polk, W.1    Housley, R.2    Bassham, L.3
  • 32
    • 84870708313 scopus 로고    scopus 로고
    • Additional algorithms and identifiers for RSA cryptography for use in the internet x.509 public key infrastructure certificate and certificate revocation list (CRL) profile
    • June
    • J. Schaad, B. Kaliski and R. Housley, “Additional Algorithms and Identifiers for RSA Cryptography for use in the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile”, RFC 4055, June 2005.
    • (2005) RFC 4055
    • Schaad, J.1    Kaliski, B.2    Housley, R.3
  • 33
    • 79751509497 scopus 로고    scopus 로고
    • Establishment of authenticated secret session keys using digital signature standard
    • G. P. Biswas, “Establishment of Authenticated Secret Session Keys Using Digital Signature Standard”, Information Security Journal: A Global Prospective, 2011, 20(1): 09-16.
    • (2011) Information Security Journal: A Global Prospective , vol.20 , Issue.1 , pp. 09-16
    • Biswas, G.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.