期刊文献+

对IPSec中AH和ESP协议的分析与建议 被引量:6

Analysis and Suggestion on the AH and ESP in IPSec
下载PDF
导出
摘要 IPSec是IETF提供的在Internet上进行安全通信的一系列规范。由于历史的原因,从开始设计IPSec的那一天起,IPSec的体系结构就逐渐走向了复杂,变得越来越庞大而不合理。为了简化IPSec的体系结构,提高IPSec的运行效率,在介绍了IPSec中的AH和ESP协议以及它们的工作模式的基础上,通过对AH和ESP异同点的分析和比较,提出了一条简化IPSec体系结构的思路,那就是不妨考虑通过取消AH协议来实现。这对IPSec的理论研究和实际应用都具有一定的参考价值。 IPSec is a series of norms proposed by International Engineer Task Force(IETF), which can be used to communication security on Internet. IPSee has an over scaled architecture, and becomes more and more complicated due to history. In order to simplify IPSec architecture and improve the efficiency,introduces the AH, ESP and their working mode in IPSec in detail, compares the differences and similarities between the AH and ESP, suggests an idea of simplifying IPSec architecture by abolishing the AH. The research work should be valuable in the project application and the theory research of IPSec.
作者 蓝集明 陈林
出处 《计算机技术与发展》 2009年第11期15-17,22,共4页 Computer Technology and Development
基金 四川省教育基础应用研究基金(2008A140)
关键词 IPSEC AH ESP IPSec AH ESP
  • 相关文献

参考文献9

  • 1关慧,刘俊,曹连刚.基于IPv6-IPSec的网络安全访问的实现[J].微计算机信息,2008,24(6):95-96. 被引量:5
  • 2IPv4到IPv6:互联网的发展趋势[EB/OL].2007-03-02.http://www. 51cto. com/artf200703/41354.htm.
  • 3蓝集明 张海燕.对IPv4/IPv6过渡技术的分析与研究.电脑知识与技术,2008,4(7):1886-1886.
  • 4Kent S, RFC 4302: IP Authentication Header[S]. 2005.
  • 5Kent S,Seo K. RFC 4301: Security Architecture for the Internet Protocol[S]. 2005.
  • 6Kent S. RFC 4303: IP Encapsulating Security Payload (ESP) [S]. 2005.
  • 7李振强,赵晓宇,马严.IPv6技术揭秘[M].北京:人民邮电出版社,2006:255-234.
  • 8江伟,苏本跃,周健.IPSec在基于IPv6的校园网安全中的应用研究[J].计算机技术与发展,2007,17(2):229-232. 被引量:4
  • 9黄智,龚向阳,阙喜戎,王文东.IPsec协议的研究和分析[J].计算机工程与应用,2002,38(11):160-162. 被引量:7

二级参考文献20

  • 1陈卓,张正文,陈晓炜.IPSec中AH和ESP协议的比较与应用[J].计算机应用与软件,2004,21(7):105-106. 被引量:7
  • 2[1]B Schneier,D Whiting. A Performance Comparison of the Five AES Finalists[C].In:Third AES Candidate Conference,2000
  • 3[2]S Frankel,S Kelly ,R Glenn.The Candidate AES Cipher Algorithms and Their Use With IPsec.INTERNET DRAFT,2000
  • 4[3]N Ferguson,B Schneier. A Cryptographic Evaluation of IPsec.Counterpane Intemet Security,Inc
  • 5[4]V Tzvetkov,E Sanchez. Mobile Virtual Private Network. INTERNET DRAFT, 2000
  • 6[5]S Kent,R Atkinson. Security Architecture for the Intemet Protocol[S].RFC 2401,1998
  • 7[6]W A Simpson. IKE/ISAKMP considered harmful. USENIX Association,1999
  • 8[7]K Matsuura,H Imai.Modified aggressive mode of Internet key exchange resistant against denial-of-service attacks[J].IEICE Transactions on Information and Systems, 2000-05
  • 9[8]P Eronen. Denial of service in public key protocols. Helsinki University of Technology Telecommunications Software and Multimedia Laboratory, 2000
  • 10[9]K Hamzeh,G Pal1,W Verthein et al. Point-to-Point Tunneling Protocol[S].RFC 2637,1999

共引文献30

同被引文献26

  • 1徐家臻,陈莘萌.基于IPSec与基于SSL的VPN的比较与分析[J].计算机工程与设计,2004,25(4):586-588. 被引量:90
  • 2马仝芬,付晓玲.IPv4与IPv6兼容网络编程模式[J].北方工业大学学报,2005,17(3):25-29. 被引量:3
  • 3杨黎斌,慕德俊,蔡晓妍,刘航.基于硬件加密的嵌入式VPN网关实现[J].计算机工程与应用,2007,43(4):122-124. 被引量:4
  • 4Gilligan R,Thomson S,Bound J,et al.IETF RFC 3493:Basic Socket Interface Extensions for IPv6.http://www.ietf.org/rfc/rfc3493.txt?number=3493.
  • 5Stevens W,Thomas M,Nordmark E,et al.IETF RFC 3542:Advanced Sockets Application Program Interface (API) for IPv6.http://www.ietf.org/rfc/rfc3542.txt?number=3542.
  • 6Shin M-K Ed,Hong Y-G,Hagino J,et al.IETF RFC 4038:Application Aspects of IPv6 Transition.http://www.ietf.org/rfc/rfc4038.txt?number=4038.
  • 7RFC240I:Security Architecture for thr Internet Protocol [S]. 1998.
  • 8Kent S, Atkison R, RFC 2401: Security Architecture for thr Internet Protocol[S].1998.
  • 9Kent S,Atkinson R. IP Authentication Header[ S]. RFC2402 IETF,1998.
  • 10Kent S, Atkinson R. IP Encapsulating Security Payload[ S]. RFC2406 IETF, 1998.

引证文献6

二级引证文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部