Oakley protocol

From Wikipedia, the free encyclopedia

The Oakley Key Determination Protocol is a key-agreement protocol that allows authenticated parties to exchange keying material across an insecure connection using the Diffie-Hellman key exchange algorithm. The protocol was proposed by H. Orman in 1998, and has been implemented in Cisco Systems' ISAKMP daemon.[1] The Oakley protocol also helped shaped the definition of the more widely used Internet key exchange protocol.[2]

[edit] External links

  • RFC 2412 The OAKLEY Key Determination Protocol
  • RFC 2409 The Internet Key Exchange (IKE)

[edit] References

  1. ^ RED ISAKMP and Oakley Information. Cisco Systems. Retrieved on 2006-11-12.
  2. ^ What is Internet Key Exchange?. TechTarget. Retrieved on 2006-11-12.
Public-key cryptography
v  d  e
Algorithms: Cramer-Shoup | DH | DSA | ECDH | ECDSA | EKE | ElGamal | GMR | IES | Lamport | MQV | NTRUEncrypt | NTRUSign | Paillier | Rabin | Rabin-Williams | RSA | Schnorr | SPEKE | SRP | XTR
Theory: Discrete logarithm | Elliptic curve cryptography | RSA problem
Standardization: ANS X9F1 | CRYPTREC | IEEE P1363 | NESSIE | NSA Suite B   Misc: Digital signature | Fingerprint | PKI | Web of trust | Key size
Cryptography
v  d  e
History of cryptography | Cryptanalysis | Cryptography portal | Topics in cryptography
Symmetric-key algorithm | Block cipher | Stream cipher | Public-key cryptography | Cryptographic hash function | Message authentication code | Random numbers