Skip to main content

Internet Key Exchange Protocol Using ECC-Based Public Key Certificate

  • Chapter
  • First Online:
  • 1511 Accesses

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 229))

Abstract

Internet Key Exchange (IKE) protocol helps to exchange cryptographic techniques and keying materials as prior security association (SA) between two IP hosts. Similar to the several enhancements, the present paper proposes an efficient implementation of IKE using ECC-based public-key certificate that provides required security properties with much reduction in computation complexity and communication cost. The proposed method addresses both the Phase I and Phase II of IKE, where the main mode of the former instead of six, requires four rounds of message exchange. The formats specified in ISAKMP have been used for message exchanges in our implementation, thus the cookies of initiator-responder have been used to protect attacks like DoS, parallel session etc. The security analysis of the proposed method and comparison with other techniques are given and satisfactory performance is found.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Zhou J (2000) Further analysis of the Internet key exchange protocol. Comput Commun 23:1606–1612

    Article  Google Scholar 

  2. Forouzan BA (2007) Cryptography and network security. Special Indian edition 2007, TMH, pp 563–588

    Google Scholar 

  3. Zhu J-m, Ma J-f (2004) An internet key exchange protocol based on public key infrastructure. J Shanghai Uni (English Ed). Article ID: 1007-6417(2004)01-0051-06

    Google Scholar 

  4. Kaufman C (2004) The internet key exchange (IKEv2) protocol. IETF draft-ietf-ipsec-ikev2-17, Sept 2004

    Google Scholar 

  5. Haddad H, Berenjkoub M, Gazor S (2004) A proposed protocol for internet key exchange (IKE). Electrical and computer engineering, Canadian conference, May 2004

    Google Scholar 

  6. Orman H (1998) The OAKLEY key determination protocol, RFC 2412

    Google Scholar 

  7. Maughan D et al (1998) Internet security association and key management protocol (ISAKMP), RFC 2408

    Google Scholar 

  8. Su M-Y, Chang J-F (2007) An efficient and secured internet key exchange protocol design. Proceedings of the fifth annual conference on communication networks and services research (CNSR’07), pp 184–192

    Google Scholar 

  9. Fereidooni H, Taheri H, Mahramian M (2009) A new authentication and key exchange protocol for insecure networks. In: Proceedings of the fifth international conference on wireless communication, networking and mobile computing (WiCom’09), pp 1–4

    Google Scholar 

  10. Nagalakshmi V, Rameshbabu I (July 2007) A protocol for internet key exchange (IKE) using public encryption key and public signature key. Int J Comput Sci Netw Secur 7(7):342–346

    Google Scholar 

  11. Nagalakshmi V, Rameshbabu I, Avadhani PS (2011) Modified protocols for internet key exchange using public encryption key and signature keys. In: Proceedings of the \(8^{\rm {th}}\) international conference on information technology: new generations 2011, pp 376–381

    Google Scholar 

  12. Ray S, Nandan R, Biswas GP (2012) ECC based IKE protocol design for internet applications, Procedia Technology, Elsevier: Proceedings of 2\(^{\rm {nd}}\) international conference on computer, communication, control and information technology (2012) C3IT 2012, Hooghly, WB, India, 25–26 Feb 2012, pp 522–529

    Google Scholar 

  13. Ray S, Biswas GP (2012) Establishment of ECC-based initial secrecy usable for IKE implementation. Lecture notes in engineering and computer science: proceedings of the world congress on engineering 2012, WCE 2012, London, UK, 4–6 July 2012, pp 530–535

    Google Scholar 

  14. Koblitz N (1987) Elliptic curve cryptosystem. J Math Comput 48(177):203–209

    Google Scholar 

  15. Miller V (1985) Use of elliptic curves in cryptography. In: Williams HC (ed) Advances in cryptology-CRYPTO 85, LNCS 218. Springer, Berlin, pp 417–426

    Google Scholar 

  16. Dang Q, Santesson S, Moriarty K, Brown D, Polk T (2010) Internet X.509 public key infrastructure: additional algorithms and identifiers for DSA and ECDSA, RFC 5758, Jan 2010

    Google Scholar 

  17. Weise J (2001) Public key infrastructure overview, Sun PSSM global security practice. Sun Blue Prints™ Online, Aug 2001

    Google Scholar 

  18. National Institute of Standards and Technology (2001) Introduction to public key technology and the federal PKI infrastructure. National Institute of Standards and Technology, 26 Feb 2001

    Google Scholar 

  19. Schaad J, Kaliski B, Housley R (2005) Additional algorithms and identifiers for RSA cryptography for use in the internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile, RFC 4055, June 2005

    Google Scholar 

  20. Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644–654

    Google Scholar 

  21. Biswas GP (2011) Establishment of authenticated secret session keys using digital signature standard. Inf Secur J: A Glob Prosp 20(1):09–16

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sangram Ray .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media Dordrecht

About this chapter

Cite this chapter

Ray, S., Biswas, G.P. (2013). Internet Key Exchange Protocol Using ECC-Based Public Key Certificate. In: Yang, GC., Ao, Sl., Gelman, L. (eds) IAENG Transactions on Engineering Technologies. Lecture Notes in Electrical Engineering, vol 229. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-6190-2_30

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-6190-2_30

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-6189-6

  • Online ISBN: 978-94-007-6190-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics