Arcanum: A Secure and Efficient Key Exchange Protocol for the Internet

Ajmal Mian, A. Masood

    Research output: Chapter in Book/Conference paperConference paper

    5 Citations (Scopus)

    Abstract

    A VPN establishes a cryptographically secure network using the existing insecure infrastructure of the Internet. A number of protocols, including IPSec have been designed to establish VPNs. However, keys must be shared between the communicating peers before a VPN can be established. IKE protocol is used for exchanging keys between authenticated peers over the Internet. However, IKE is vulnerable to DoS attacks and has security holes. A number of protocols have been proposed to replace IKE but these protocols also have vulnerabilities of their own. In this paper, we present an analysis of IKE and identify its security holes and design weaknesses. We also propose a more secure and efficient key exchange protocol, Arcanum, and carry out its security analysis and comparison with existing protocols. Arcanum is more secure, robust to DoS attacks and efficient in terms of time and number of messages.
    Original languageEnglish
    Title of host publicationProceedings of the International Conference on Information Technology Coding and Computing (ITCC)
    EditorsA Abraham, J Thomas
    Place of PublicationUSA
    PublisherIEEE, Institute of Electrical and Electronics Engineers
    Pages17-21
    Volume1
    ISBN (Print)0769527088
    Publication statusPublished - Apr 2004
    EventArcanum: A Secure and Efficient Key Exchange Protocol for the Internet - Las Vegas, USA
    Duration: 1 Jan 2004 → …

    Conference

    ConferenceArcanum: A Secure and Efficient Key Exchange Protocol for the Internet
    Period1/01/04 → …

    Fingerprint Dive into the research topics of 'Arcanum: A Secure and Efficient Key Exchange Protocol for the Internet'. Together they form a unique fingerprint.

    Cite this