Back to Search
Start Over
Asymmetric disribution of computations in Internet Key Exchange Protocol
- Source :
- 2008 Canadian Conference on Electrical and Computer Engineering.
- Publication Year :
- 2008
- Publisher :
- IEEE, 2008.
-
Abstract
- IPsec security mechanism standard offers Internet key exchange protocol (IKEv2) for establishing and managing its secure sessions. In IKEv2 both two participants perform the same amount of calculations in all cases and this would cause some deficiencies, when it is used in different situations with different properties. For example in most of client-server connections it is more preferable for servers to do fewer operations in comparison with clients. In the other side in some connections, initiators are entities with less power of computing when comparing with responders. Mobile users are examples of such entities. In these connections, the initiators are the entities who need to perform fewer operations. To solve this problem, we propose two protocols with asymmetric schemes for distribution the calculations. In proposed protocols, one of the participants performs fewer computations, depending on the properties of connections. To achieve this asymmetric scheme, Schnorr signature scheme is used by the entity needs to perform fewer computations.
Details
- ISSN :
- 08407789
- Database :
- OpenAIRE
- Journal :
- 2008 Canadian Conference on Electrical and Computer Engineering
- Accession number :
- edsair.doi...........47ba11e3c294ca5d670354fc22befdd7