Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Share this Page URL

Cryptographic Key Management > Diffie­Hellman Key Exchange Protocol - Pg. 53

AnIntroductionToCryptography·Chapter3 53 freely, the secrecy of the private key needs to be maintained at all times. It is also very important in the case of a private/public key pair, that the public key cannot be used to derive the private key. Cryptographic key management is a set of provisions to ensure that the confidentiality and the integrity of the key are maintained through out the life of the process. Examples of key management protocols include: Internet Security Association and Key Management Protocol (ISAKMP) Diffie-Hellman key exchange protocol Internet Security Association and Key Management Protocol Used in IPSec-based applications, ISAKMP provides a framework for establishing, negotiating, modify- ing, and deleting security associations. It provides authentication and key management capabilities to IPSec by using a consistent framework for transferring key and authentication data independent of the key generation technique, encryption algorithm, and the authentication mechanism. ISAKMP uses digital signatures based on a public key cryptography to provide strong authen- tications and to prevent Man-in-the-middle (MITM) attacks against the encrypted communication channels.