Negotiation of Security Parameters in ISAKMP under Multicast Environments
碩士 === 國立臺灣大學 === 電機工程學系研究所 === 86 === Network security is an important fundamental building block of many Internetap plications, such as electronic commerce and electronic voting. Althoughnetwork security can be enforced in all OSI layers, providing sec...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
1998
|
Online Access: | http://ndltd.ncl.edu.tw/handle/64670692775594015014 |
id |
ndltd-TW-086NTU00442108 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-086NTU004421082016-06-29T04:13:46Z http://ndltd.ncl.edu.tw/handle/64670692775594015014 Negotiation of Security Parameters in ISAKMP under Multicast Environments 群播環境下之安全參數交涉模型 Chiu, Yuen-Peng 邱允鵬 碩士 國立臺灣大學 電機工程學系研究所 86 Network security is an important fundamental building block of many Internetap plications, such as electronic commerce and electronic voting. Althoughnetwork security can be enforced in all OSI layers, providing securityservices at the network layer has some advantages, such as uniformity andtransparency.IP Secu rity (IPsec) is a working group of IETF, and its goal is to propose thearchite cture to provide cryptographically-based security services for the IPprotocols , both IPv4 and IPv6. Furthermore, key management plays animportant role in th e IPsec architecture. ISAKMP (Internet SecurityAssociation and Key Management Protocol) is one automated key managementprotocol of the IP Security protocol suite, and it is used to negotiatesecurity parameters between entities, e.g., encryption algorithms, algorithmmodes, key length, etc. However, the current d raft of ISAKMP is onlyapplicable under unicast environments, that is, it does not supportmulticast communications.In this thesis, we propose some models by which security parameters can benegotiated using ISAKMP under multicast enviro nments. For each model, wealso suggest some corresponding key management mecha nisms. Besides, ourmodels are independent of multicast routing protocols. More over, our modelsare capable of supporting dynamic membership. Our models are e asy toimplement, so little change is needed for implementations of ISAKMP to i ncludeour models. Group members can choose security parameters according to th eirdemands by our proposed models. Chin-Laung Lei 雷欽隆 --- 1998 學位論文 ; thesis 47 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立臺灣大學 === 電機工程學系研究所 === 86 === Network security is an important fundamental building block of many Internetap
plications, such as electronic commerce and electronic voting. Althoughnetwork
security can be enforced in all OSI layers, providing securityservices at the
network layer has some advantages, such as uniformity andtransparency.IP Secu
rity (IPsec) is a working group of IETF, and its goal is to propose thearchite
cture to provide cryptographically-based security services for the IPprotocols
, both IPv4 and IPv6. Furthermore, key management plays animportant role in th
e IPsec architecture. ISAKMP (Internet SecurityAssociation and Key Management
Protocol) is one automated key managementprotocol of the IP Security protocol
suite, and it is used to negotiatesecurity parameters between entities, e.g.,
encryption algorithms, algorithmmodes, key length, etc. However, the current d
raft of ISAKMP is onlyapplicable under unicast environments, that is, it does
not supportmulticast communications.In this thesis, we propose some models by
which security parameters can benegotiated using ISAKMP under multicast enviro
nments. For each model, wealso suggest some corresponding key management mecha
nisms. Besides, ourmodels are independent of multicast routing protocols. More
over, our modelsare capable of supporting dynamic membership. Our models are e
asy toimplement, so little change is needed for implementations of ISAKMP to i
ncludeour models. Group members can choose security parameters according to th
eirdemands by our proposed models.
|
author2 |
Chin-Laung Lei |
author_facet |
Chin-Laung Lei Chiu, Yuen-Peng 邱允鵬 |
author |
Chiu, Yuen-Peng 邱允鵬 |
spellingShingle |
Chiu, Yuen-Peng 邱允鵬 Negotiation of Security Parameters in ISAKMP under Multicast Environments |
author_sort |
Chiu, Yuen-Peng |
title |
Negotiation of Security Parameters in ISAKMP under Multicast Environments |
title_short |
Negotiation of Security Parameters in ISAKMP under Multicast Environments |
title_full |
Negotiation of Security Parameters in ISAKMP under Multicast Environments |
title_fullStr |
Negotiation of Security Parameters in ISAKMP under Multicast Environments |
title_full_unstemmed |
Negotiation of Security Parameters in ISAKMP under Multicast Environments |
title_sort |
negotiation of security parameters in isakmp under multicast environments |
publishDate |
1998 |
url |
http://ndltd.ncl.edu.tw/handle/64670692775594015014 |
work_keys_str_mv |
AT chiuyuenpeng negotiationofsecurityparametersinisakmpundermulticastenvironments AT qiūyǔnpéng negotiationofsecurityparametersinisakmpundermulticastenvironments AT chiuyuenpeng qúnbōhuánjìngxiàzhīānquáncānshùjiāoshèmóxíng AT qiūyǔnpéng qúnbōhuánjìngxiàzhīānquáncānshùjiāoshèmóxíng |
_version_ |
1718327780234493952 |