Oakley protocol
From Wikipedia, the free encyclopedia
The Oakley Key Determination Protocol is a key-agreement protocol that allows authenticated parties to exchange keying material across an insecure connection using the Diffie-Hellman key exchange algorithm. The protocol was proposed by H. Orman in 1998, and has been implemented in Cisco Systems' ISAKMP daemon.[1] The Oakley protocol also helped shaped the definition of the more widely used Internet key exchange protocol.[2]
[edit] External links
[edit] References
- ^ RED ISAKMP and Oakley Information. Cisco Systems. Retrieved on 2006-11-12.
- ^ What is Internet Key Exchange?. TechTarget. Retrieved on 2006-11-12.
Algorithms: Cramer-Shoup | DH | DSA | ECDH | ECDSA | EKE | ElGamal | GMR | IES | Lamport | MQV | NTRUEncrypt | NTRUSign | Paillier | Rabin | Rabin-Williams | RSA | Schnorr | SPEKE | SRP | XTR |
Theory: Discrete logarithm | Elliptic curve cryptography | RSA problem |
Standardization: ANS X9F1 | CRYPTREC | IEEE P1363 | NESSIE | NSA Suite B Misc: Digital signature | Fingerprint | PKI | Web of trust | Key size |
History of cryptography | Cryptanalysis | Cryptography portal | Topics in cryptography |
Symmetric-key algorithm | Block cipher | Stream cipher | Public-key cryptography | Cryptographic hash function | Message authentication code | Random numbers |