Using Authenticated Encryption Algorithms with the Encrypted Payload of the Internet Key Exchange version 2 (IKEv2) Protocol.
David L. BlackDavid A. McGrewPublished in: RFC (2008)
Keyphrases
- key exchange
- encryption algorithm
- security analysis
- encryption algorithms
- key exchange protocol
- image encryption
- encryption scheme
- diffie hellman
- public key
- authentication protocol
- smart card
- security requirements
- security properties
- key distribution
- security mechanisms
- user authentication
- password based authenticated key exchange
- access control
- private key
- digital signature
- distributed databases
- network traffic