期刊文献+

IPSec的安全属性及其技术途径分析 被引量:7

Analysis of security attributes in IPSec and their approaches
下载PDF
导出
摘要 IPSec的复杂性使得对其安全性的理解比较容易产生偏差,从而直接影响到其产品实现的安全功能和性能。在充分研究IPSec标准协议的基础上,着重从传输安全和密钥管理安全两个方面对IPSec所包含的安全属性及其技术途径进行了分析,并就其协议簇所期望达到的安全性能进行了探讨,同时也指出了其中的一些不足。 The inaccurate comprehension oflPSec is prone to happen because of its complexity, which affects the security function and performance of its implementation directly. From the security of transport and key management, the security attributes oflPSec and their approaches were analyzed, the expected security performance oflPSec protocol suite was discussed, and meanwhile some deficiencies were pointed out.
出处 《计算机工程与设计》 CSCD 北大核心 2005年第10期2627-2629,共3页 Computer Engineering and Design
基金 中国工程物理研究院基金项目(20030661)
关键词 因特网协议安全 传榆安全 密钥管理安全 安全属性 IPSec transport security key management security security attribute
  • 相关文献

参考文献10

  • 1Kent S, Atkinson R. Security architecture for the internet protocol[S]. RFC2401, 1998.
  • 2M Gilmore Linda,Hall Charles, Barbara Mayer, et al.U.S. department of defense virtual private network (VPN) boundary gateway protection profile (PP) for basic robustness environments[R]. 2001.
  • 3Niels Ferguson Schneier Bruce. A cryptographic evaluation of IPSec[EB/OL]. 1999-04. http:∥www. counterpane.com.
  • 4Kent S, Atkinson R. IP encapsulating security payload[S]. RFC-2406, 1998.
  • 5Kent S, Atkinson R. IP authentication header[S].RFC2402, 1998.
  • 6Harkins, D Carrel D. The internet key exchange[S]. RFC2409,1998.
  • 7Radia Perlman Charlie Kaufman. Analysis of the IPSec key exchange standard[EB/OL].2001-06. http:∥csdl.computer. org.
  • 8Hugo Krawczyk. Rationale for the definitions of SKEYID [EB/OL].2001-06. http:∥www.vpnc.org/ietf-ipsec/mail-archive/msg00844. html.
  • 9Karn P, Simpson W. Photuris: Session-key management protocol[S]. RFC2522, 1999.
  • 10Charlie Kaufman. Internet key exchange (IKEv2) protocol[R].draft-ietf-ipsec-ikev2-14.txt, 2004.

同被引文献48

  • 1潘振业,李学干.一种基于IPSec的VPN实现[J].微机发展,2005,15(3):133-135. 被引量:4
  • 2严新,常黎.IPSec研究及实现[J].计算机工程与设计,2005,26(9):2458-2460. 被引量:4
  • 3黄俊,韩玲莉.IPSec策略冲突发现形式化技术的研究[J].计算机工程与应用,2007,43(6):128-131. 被引量:1
  • 4张昭理,洪帆,肖海军.一种防火墙规则冲突检测算法[J].计算机工程与应用,2007,43(15):111-113. 被引量:9
  • 5Martin Abadi. Explicit Communication Revisited Two New Attacks on Authentication Protocols~J~. IEEE Transactions on Software Engineering, 1997,23(3): 185 - 186.
  • 6Kent S, Atkinson R. IP Encapsulating Security Pay - load [EB/OL]. http:// www. ietf. org/html.charters/ipsec - charter. html : November1998.
  • 7Kent S, Atkinson R. Security Architecture for the Internet Protocol[S]. RFC2401,1998.
  • 8Kent S, Atkinson R. IP Encapsulating Security Payload (ESP) [S]. RFC2406,1998.
  • 9Kent S, Atkinson R. IP Authentication Header(AH) [S]. RFC2402,1998.
  • 10Hazem Hamed,Will Marrero. Modeling and Verification of IPSec and VPN Security Policies . ICNP,2005(13): 259 -278.

引证文献7

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部