SlideShare a Scribd company logo
INTERNET KEY EXCHANGE
Presented by
M.Vidhya
I-M.Sc (CS)
Nadar Saraswathi College of Arts and Science
What is Internet Key Exchange (IKE)?
Internet Key Exchange (IKE) is a standard protocol
used to set up a secure and authenticated
communication channel between two parties via a
virtual private network (VPN). The protocol
ensures security for VPN negotiation, remote host
and network access.
There are two versions of IKE
standards:
IKE protocol defined in RFC 2409
IKE version 2 (IKEv2) defined in RFC
7296
Most often, IKE uses X.509 public key
infrastructure (PKI) certificates for authentication
and a Diffie-Hellman key exchange protocol to
establish a shared secret session.
A hybrid protocol, IKE, also implements two
earlier security protocols, Oakley and SKEME,
within an Internet Security Association and Key
Management Protocol (ISAKMP) TCP/IP-based
framework.
cryptography.pptx
How does IKE work in IPsec?
IKE is a part of IPsec, a suite of protocols and
algorithms used to secure sensitive data
transmitted across a network. The Internet
Engineering Task Force (IETF) developed IPsec to
provide security through authentication and
encryption of IP network packets and secure
VPNs.
Understanding phase 1 and phase 2 of IKE
The original version of IKE sets up secure communications
channels in two phases: phase 1 and phase 2.
In phase 1, an authenticated connection between the host
and user is established using a preshared key or a digital
certificate. The goal is to secure the communications that
occur in phase 2. The Diffie-Hellman key exchange algorithm
creates a secure authentication communication channel. This
digital encryption method uses numbers raised to specific
powers to produce decryption keys.
cryptography.pptx
What are the potential challenges of using IKE?
IKE may pose the following challenges:
IKEv1 is vulnerable to Bleichenbacher attacks, which obtain
information about a device based on the device's response
to receiving a modified ciphertext. IOS and Cisco Systems
still support IKEv1.
Using IKEv2 in some operating systems (OS) may require
users to make additional manual configurations. For
example, if IKE in Junos OS is not explicitly configured,
Junos OS defaults to version 1 of IKE.
Thank you

More Related Content

PDF
CRYPTO_REPORT on SECURITY POLICY.pdf
Spammer7
 
PDF
Internet Key Exchange (ikev2) Protocol
Netwax Lab
 
PDF
Design methodology for ip secured tunel based embedded platform for aaa server
ijmnct
 
PPTX
IPSec VPN & IPSec Protocols
NetProtocol Xpert
 
PDF
20 palo alto site to site
Mostafa El Lathy
 
PPT
Introdutction – Security & Authentication in WLAN
cszxd
 
PPTX
L2 tp., ip sec
ZekriaMuzafar
 
PPTX
Network Security version Virtual Private Networks
Zaheer Parvez
 
CRYPTO_REPORT on SECURITY POLICY.pdf
Spammer7
 
Internet Key Exchange (ikev2) Protocol
Netwax Lab
 
Design methodology for ip secured tunel based embedded platform for aaa server
ijmnct
 
IPSec VPN & IPSec Protocols
NetProtocol Xpert
 
20 palo alto site to site
Mostafa El Lathy
 
Introdutction – Security & Authentication in WLAN
cszxd
 
L2 tp., ip sec
ZekriaMuzafar
 
Network Security version Virtual Private Networks
Zaheer Parvez
 

Similar to cryptography.pptx (20)

PDF
Attack Robustness and Security Enhancement with Improved Wired Equivalent Pro...
IDES Editor
 
DOCX
college assignment on Applications of ipsec
bigchill29
 
PDF
IPSec VPN Tutorial Part1
Abdallah Abuouf
 
DOC
Ipsec rbe guide
Wahyu Nasution
 
PPTX
I psecurity
ZainabNoorGul
 
PPTX
Cryptography and network security
PriyadharshiniVS
 
PPTX
cisco-nti-Day20
eyad alaa
 
PDF
Cn36539543
IJERA Editor
 
PPTX
crypto.pptx
Sameenafathima4
 
PPTX
crypto.pptx
Sameenafathima4
 
PPTX
crypto essential documents cryptography e
kumarrishav4866
 
PDF
Mutual query data sharing protocol for public key encryption through chosen-c...
IJECEIAES
 
PDF
How PUF Technology is Securing Io
Abacus Technologies
 
PPTX
Internet Key Exchange Protocol
Prateek Singh Bapna
 
PDF
IP security and VPN presentation
KishoreTs3
 
PDF
SECURE KEY MANAGEMENT PROTOCOL IN WIMAX
IJNSA Journal
 
PPT
Lecture 7 certificates
rajakhurram
 
PPT
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
Eric Vanderburg
 
PDF
Katuwal_Arun_flex_get_vpn.pdf
Sudershan Sundararajan CISSP SSCP
 
DOC
Anoop_VA_CV
Anoop V A
 
Attack Robustness and Security Enhancement with Improved Wired Equivalent Pro...
IDES Editor
 
college assignment on Applications of ipsec
bigchill29
 
IPSec VPN Tutorial Part1
Abdallah Abuouf
 
Ipsec rbe guide
Wahyu Nasution
 
I psecurity
ZainabNoorGul
 
Cryptography and network security
PriyadharshiniVS
 
cisco-nti-Day20
eyad alaa
 
Cn36539543
IJERA Editor
 
crypto.pptx
Sameenafathima4
 
crypto.pptx
Sameenafathima4
 
crypto essential documents cryptography e
kumarrishav4866
 
Mutual query data sharing protocol for public key encryption through chosen-c...
IJECEIAES
 
How PUF Technology is Securing Io
Abacus Technologies
 
Internet Key Exchange Protocol
Prateek Singh Bapna
 
IP security and VPN presentation
KishoreTs3
 
SECURE KEY MANAGEMENT PROTOCOL IN WIMAX
IJNSA Journal
 
Lecture 7 certificates
rajakhurram
 
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
Eric Vanderburg
 
Katuwal_Arun_flex_get_vpn.pdf
Sudershan Sundararajan CISSP SSCP
 
Anoop_VA_CV
Anoop V A
 

More from Mvidhya9 (9)

PPTX
womenempowerment.ppt
Mvidhya9
 
PPTX
IOT.ppt
Mvidhya9
 
PPTX
Color image processing ppt
Mvidhya9
 
PPTX
artifical intelligence ppt.
Mvidhya9
 
PPTX
cloud computing ppt
Mvidhya9
 
PPTX
nosql.PPT.pptx
Mvidhya9
 
PPTX
DOS.pptx
Mvidhya9
 
PPTX
python.pptx
Mvidhya9
 
PPTX
Peephole optimization
Mvidhya9
 
womenempowerment.ppt
Mvidhya9
 
IOT.ppt
Mvidhya9
 
Color image processing ppt
Mvidhya9
 
artifical intelligence ppt.
Mvidhya9
 
cloud computing ppt
Mvidhya9
 
nosql.PPT.pptx
Mvidhya9
 
DOS.pptx
Mvidhya9
 
python.pptx
Mvidhya9
 
Peephole optimization
Mvidhya9
 

Recently uploaded (20)

PDF
Multiwavelength Study of a Hyperluminous X-Ray Source near NGC6099: A Strong ...
Sérgio Sacani
 
PPTX
Internal Capsule_Divisions_fibres_lesions
muralinath2
 
PPTX
Hepatopulmonary syndrome power point presentation
raknasivar1997
 
PPTX
Cell Structure and Organelles Slides PPT
JesusNeyra8
 
PPTX
Qualification of.UV visible spectrophotometer pptx
shrutipandit17
 
PDF
Migrating Katalon Studio Tests to Playwright with Model Driven Engineering
ESUG
 
PPTX
Nanofertilizer: Its potential benefits and associated challenges.pptx
BikramjitDeuri
 
PPTX
Q1_Science 8_Week4-Day 5.pptx science re
AizaRazonado
 
PDF
The Cosmic Symphony: How Photons Shape the Universe and Our Place Within It
kutatomoshi
 
PPTX
Sleep_pysilogy_types_REM_NREM_duration_Sleep center
muralinath2
 
PPTX
mirna_2025_clase_genética_cinvestav_Dralvarez
Cinvestav
 
PPTX
Home Garden as a Component of Agroforestry system : A survey-based Study
AkhangshaRoy
 
PPT
Grade_9_Science_Atomic_S_t_r_u_cture.ppt
QuintReynoldDoble
 
PDF
Identification of unnecessary object allocations using static escape analysis
ESUG
 
PPTX
Role of GIS in precision farming.pptx
BikramjitDeuri
 
PPTX
The Toxic Effects of Aflatoxin B1 and Aflatoxin M1 on Kidney through Regulati...
OttokomaBonny
 
PDF
study of microbiologically influenced corrosion of 2205 duplex stainless stee...
ahmadfreak180
 
PPTX
METABOLIC_SYNDROME Dr Shadab- kgmu lucknow pptx
ShadabAlam169087
 
PPTX
Feeding stratagey for climate change dairy animals.
Dr.Zulfy haq
 
PPTX
Embark on a journey of cell division and it's stages
sakyierhianmontero
 
Multiwavelength Study of a Hyperluminous X-Ray Source near NGC6099: A Strong ...
Sérgio Sacani
 
Internal Capsule_Divisions_fibres_lesions
muralinath2
 
Hepatopulmonary syndrome power point presentation
raknasivar1997
 
Cell Structure and Organelles Slides PPT
JesusNeyra8
 
Qualification of.UV visible spectrophotometer pptx
shrutipandit17
 
Migrating Katalon Studio Tests to Playwright with Model Driven Engineering
ESUG
 
Nanofertilizer: Its potential benefits and associated challenges.pptx
BikramjitDeuri
 
Q1_Science 8_Week4-Day 5.pptx science re
AizaRazonado
 
The Cosmic Symphony: How Photons Shape the Universe and Our Place Within It
kutatomoshi
 
Sleep_pysilogy_types_REM_NREM_duration_Sleep center
muralinath2
 
mirna_2025_clase_genética_cinvestav_Dralvarez
Cinvestav
 
Home Garden as a Component of Agroforestry system : A survey-based Study
AkhangshaRoy
 
Grade_9_Science_Atomic_S_t_r_u_cture.ppt
QuintReynoldDoble
 
Identification of unnecessary object allocations using static escape analysis
ESUG
 
Role of GIS in precision farming.pptx
BikramjitDeuri
 
The Toxic Effects of Aflatoxin B1 and Aflatoxin M1 on Kidney through Regulati...
OttokomaBonny
 
study of microbiologically influenced corrosion of 2205 duplex stainless stee...
ahmadfreak180
 
METABOLIC_SYNDROME Dr Shadab- kgmu lucknow pptx
ShadabAlam169087
 
Feeding stratagey for climate change dairy animals.
Dr.Zulfy haq
 
Embark on a journey of cell division and it's stages
sakyierhianmontero
 

cryptography.pptx

  • 1. INTERNET KEY EXCHANGE Presented by M.Vidhya I-M.Sc (CS) Nadar Saraswathi College of Arts and Science
  • 2. What is Internet Key Exchange (IKE)? Internet Key Exchange (IKE) is a standard protocol used to set up a secure and authenticated communication channel between two parties via a virtual private network (VPN). The protocol ensures security for VPN negotiation, remote host and network access.
  • 3. There are two versions of IKE standards: IKE protocol defined in RFC 2409 IKE version 2 (IKEv2) defined in RFC 7296
  • 4. Most often, IKE uses X.509 public key infrastructure (PKI) certificates for authentication and a Diffie-Hellman key exchange protocol to establish a shared secret session. A hybrid protocol, IKE, also implements two earlier security protocols, Oakley and SKEME, within an Internet Security Association and Key Management Protocol (ISAKMP) TCP/IP-based framework.
  • 6. How does IKE work in IPsec? IKE is a part of IPsec, a suite of protocols and algorithms used to secure sensitive data transmitted across a network. The Internet Engineering Task Force (IETF) developed IPsec to provide security through authentication and encryption of IP network packets and secure VPNs.
  • 7. Understanding phase 1 and phase 2 of IKE The original version of IKE sets up secure communications channels in two phases: phase 1 and phase 2. In phase 1, an authenticated connection between the host and user is established using a preshared key or a digital certificate. The goal is to secure the communications that occur in phase 2. The Diffie-Hellman key exchange algorithm creates a secure authentication communication channel. This digital encryption method uses numbers raised to specific powers to produce decryption keys.
  • 9. What are the potential challenges of using IKE? IKE may pose the following challenges: IKEv1 is vulnerable to Bleichenbacher attacks, which obtain information about a device based on the device's response to receiving a modified ciphertext. IOS and Cisco Systems still support IKEv1. Using IKEv2 in some operating systems (OS) may require users to make additional manual configurations. For example, if IKE in Junos OS is not explicitly configured, Junos OS defaults to version 1 of IKE.