期刊文献+

IPsec协议的研究和分析 被引量:7

The Study and Analysis of IPsec Protocols to Build VPN
在线阅读 下载PDF
导出
摘要 IPsec设计的目的是通过身份鉴别、数据加密和数据完整性保护,使端对端用户完成安全的通信。IPsec也成为构建VPN的一个基本协议。IPsec的体系结构随着对安全问题的探索而变得越来越庞杂。文章对IPsec的框架体系进行了研究,并分析了各个部分引入的安全问题。 IPsec protocols are designed to achieve securit y communications between end-to-end users through identity authentication,data encryption and data integrality.IPsec is newly one of the basic protocols desig ned to form VPN.Along with deeply studying into security problems ,the infrast ructure of IPsec becomes more and more complex.The paper studies the infrastruc ture of IPsec,and analyses security problems related to some parts of IPsec p rotocols.
出处 《计算机工程与应用》 CSCD 北大核心 2002年第11期160-162,共3页 Computer Engineering and Applications
基金 国家信息化工作领导小组计算机网络与信息安全管理工作办公室项目基金(2001-研1-002)
关键词 网络安全 通信协议 虚拟专用网 数据处理 IPSEC协议 研究 分析 network security,IPsec,Virtual Private Network(VPN)
  • 相关文献

参考文献11

  • 1[1]B Schneier,D Whiting. A Performance Comparison of the Five AES Finalists[C].In:Third AES Candidate Conference,2000
  • 2[2]S Frankel,S Kelly ,R Glenn.The Candidate AES Cipher Algorithms and Their Use With IPsec.INTERNET DRAFT,2000
  • 3[3]N Ferguson,B Schneier. A Cryptographic Evaluation of IPsec.Counterpane Intemet Security,Inc
  • 4[4]V Tzvetkov,E Sanchez. Mobile Virtual Private Network. INTERNET DRAFT, 2000
  • 5[5]S Kent,R Atkinson. Security Architecture for the Intemet Protocol[S].RFC 2401,1998
  • 6[6]W A Simpson. IKE/ISAKMP considered harmful. USENIX Association,1999
  • 7[7]K Matsuura,H Imai.Modified aggressive mode of Internet key exchange resistant against denial-of-service attacks[J].IEICE Transactions on Information and Systems, 2000-05
  • 8[8]P Eronen. Denial of service in public key protocols. Helsinki University of Technology Telecommunications Software and Multimedia Laboratory, 2000
  • 9[9]K Hamzeh,G Pal1,W Verthein et al. Point-to-Point Tunneling Protocol[S].RFC 2637,1999
  • 10[10]A Valencia,M Littlewood,T Kolar. Cisco Layer Two Forwarding(Protocol)"L2F""[S].RFC 2341,1998

同被引文献25

  • 1关慧,刘俊,曹连刚.基于IPv6-IPSec的网络安全访问的实现[J].微计算机信息,2008,24(6):95-96. 被引量:5
  • 2江伟,苏本跃,周健.IPSec在基于IPv6的校园网安全中的应用研究[J].计算机技术与发展,2007,17(2):229-232. 被引量:4
  • 3MatinMurhammerW.虚拟私用网络技术[M].北京:清华大学出版社,2000..
  • 4BarrieSosinsky JeremyMoskowitz.中文Windows 2000 Server 24学时教程[M].北京:北京机械工业出版社,2000..
  • 5蓝集明 张海燕.对IPv4/IPv6过渡技术的分析与研究.电脑知识与技术,2008,4(7):1886-1886.
  • 6IPv4到IPv6:互联网的发展趋势[EB/OL].2007-03-02.http://www. 51cto. com/artf200703/41354.htm.
  • 7Kent S, RFC 4302: IP Authentication Header[S]. 2005.
  • 8Kent S,Seo K. RFC 4301: Security Architecture for the Internet Protocol[S]. 2005.
  • 9Kent S. RFC 4303: IP Encapsulating Security Payload (ESP) [S]. 2005.
  • 10[1]James S Tiller. Security of Virtual Private Networks[J].Information System security,2001,10(1): 18-36.

引证文献7

二级引证文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部