Results 1 to 6 of 6

Thread: How to initialize IKE

  1. #1
    Join Date
    Nov 2009
    Posts
    44

    How to initialize IKE

    What is IKE and what are the example of the same. I need some information on the same. I am working on project work were we provide proper authentication to our users. Here I got a solution to implement IKE on the same. But as I am not so good in this I need some basic overview of the same. What is it's working process or this same and what are the alternative to implement this.

  2. #2
    Join Date
    Apr 2008
    Posts
    2,277

    Re: How to initialize IKE

    IKE was designed on the basis of many examples such as Isakmp Skeme and Oakley. On this you cannot get the information detail. It is better if you can collect some online source for the same. However, it should be mentioned that IKEA's main purpose is to authenticate parties and to provide equipment to generate keys, and within the framework of security associations ( security associations is a set of rules and keys used to protect information).

  3. #3
    Join Date
    Apr 2008
    Posts
    2,276

    Re: How to initialize IKE

    The first phase aims to establish key initial parent, Skeyid in ip sec. There are more alternatives for this potential the following parties, and the first is the method requires a Secret Shared secret is already known and shared between the entities. It's called pre-shared secret. It will serve as seed for the development of the mother key which will itself be used when authenticating final.

  4. #4
    Join Date
    Apr 2008
    Posts
    2,572

    Re: How to initialize IKE

    One for alternative for sekyid is a symmetric encryption method is based on material PK to exchange sensitive data and thus establish the shared secret. The method signature can be described as a hybrid since it uses equipment that PK to sign and then authenticate the parties. The shared secret is established through his Diffie-Hellman.

  5. #5
    Join Date
    May 2008
    Posts
    2,792

    Re: How to initialize IKE

    Once the key-based parent, Skeyid will be diversified in 3 key girls Skeyid-a, d and e. These keys are used to generate the first secure tunnel between the entities, the channel IKE or Isakmp security association. It is roughly a tunnel administrative; Skeyid-a is used for authentication in this association, Skeyid-e is the encryption and Skeyid-d will be the key mother of the other security associations.

  6. #6
    Join Date
    Oct 2005
    Posts
    2,358

    Re: How to initialize IKE

    The above mentioned methods are general in including (and logical) functional level. The first exchanges are used to define the security association. The second category of trade permits for the shared secret. The third and final section of the handshake authenticates the parties and to validate all the previous trade ( and Skeyid the same time). In this first phase, aggressive mode aims to reduce trade by forcing certain parameters.
    I'm the Proud Owner of the most dangerous weapon
    known to man kind: Human Brain

Similar Threads

  1. Hdd won't initialize
    By 20phileagles in forum Hardware Peripherals
    Replies: 4
    Last Post: 11-12-2011, 03:35 AM
  2. MMC cannot initialize the snap-in
    By Golforfood in forum Windows Server Help
    Replies: 10
    Last Post: 29-08-2011, 02:56 AM
  3. Cant initialize to MBR
    By Cortezz in forum Operating Systems
    Replies: 3
    Last Post: 10-09-2010, 01:50 PM
  4. initialize USB disk
    By The Clarks in forum Vista Help
    Replies: 10
    Last Post: 19-11-2009, 01:56 AM
  5. External USB HD won't initialize
    By abdulthekewl in forum Hardware Peripherals
    Replies: 9
    Last Post: 01-08-2009, 08:55 AM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,713,872,283.51512 seconds with 17 queries