• Title/Summary/Keyword: IKE

Search Result 134, Processing Time 0.022 seconds

Configuration of an IPSec VPN Testbed and Development of an Encryption Verification Tool (IOSec VPN 테스트 베드의 구성 및 암호화 식별 도구 개발)

  • 김윤희;이계상
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.6C
    • /
    • pp.659-667
    • /
    • 2003
  • IPsec refers to a standardized set of security protocols and algorithms which can provide the integrity, the authentication and the confidentiality services for IP packets in the Internet. Between two security gateways, IPsec provides the access control, the connectionless Integrity, data origin authentication, the anti-replay, and the confidentiality services, not only to the IP layer but also to the upper layers. In this paper, we describe a VPN (Virtual Private Network) testbed configuration using the FreeS/WAN and analyze the ISAKMP messages exchanged between the linux security gateway during the IKE SA setup. Also, we describe our development of an IPSEC encryption verification tool which can be used conveniently by VPN administrators.

A Design and Implementation of IPv4/IPv6 Security Packet Analyzer (IPv4 및 IPv6 보안 패킷 분석기의 설계 및 구현)

  • Cho Jin-Ki;Kim Sang-Choon;Lee Sang-Ho
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.10 no.2
    • /
    • pp.67-75
    • /
    • 2005
  • In this paper, we design and implement real time IP security packet analyzer on IPv4 and IPv6 network. This packet analyzer sniffs and analyzes the packets generated by the protocols that are used by IPsec, IKE, IPv4 and IPv6 such as AH, ESP, ISAKMP, IP, ICMP and so on. The purpose of this analyzer is to check current security status of the network automatically. In this paper we provide implementation details and the examples of security evaluation by using our security packet analyzer system.

  • PDF

An Implementation and Performance Evaluation of IPsec System engaged IKEv2 Protocol Engine (IPsec System에서 IKEv2 프로토콜 엔진의 구현 및 성능 평가)

  • Kim, Sung-Chan;Chun, Jun-Ho;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.35-46
    • /
    • 2006
  • The current Internet Key Exchange protocol(IKE) which has been used for key exchange of security system was pointed out the faults of scalability, speed, efficiency and stability. In this research, we tried to resolve those faults, and implemented the newly designed IKEv2 protocol in the IPsec test bed system. In the trend of network expansion, the current Internet Key Exchange protocol has a limitation of network scalability, so we implemented the new Internet Key Exchange protocol as a recommendation of RFC proposal, so as to resolve the fault of the key exchange complexity and the speed of authentication process. We improved the key exchange speed as a result of simplification of complex key exchange phase, and increased efficiency with using the preexistence state value in negotiation phase.

INFRASTRUCTURE RISK MANAGEMENT IN PREPAREDNESS OF EXTREME EVENTS

  • Eun Ho Oh;Abhijeet Deshmukh;Makarand Hastak
    • International conference on construction engineering and project management
    • /
    • 2009.05a
    • /
    • pp.83-90
    • /
    • 2009
  • Natural disasters, such as the recent floods in the Midwest, Hurricane Ike in the Gulf coast region (U.S.), and the earthquake in Sichuan (China), cause severe damage to the infrastructure as well as the associated industries and communities that rely on the infrastructure. The estimated damages due to Hurricane Ike in 2008 were a staggering $27 billion, the third worst in U.S. history. In addition, the worst earthquake in three decades in Sichuan resulted in about 90,000 people dead or missing and $20 billion of the estimated loss. A common observation in the analyses of these natural disaster events is the inadequacy of critical infrastructure to withstand the forces of natural calamities and the lack of mitigation strategies when they occur on the part of emergency-related organizations, industries, and communities. If the emergency-related agencies could identify and fortify the vulnerable critical infrastructure in the preparedness stage, the damage and impacts can be significantly reduced. Therefore, it is important to develop a decision support system (DSS) for identifying region-specific mitigation strategies based on the inter-relationships between the infrastructure and associated industries and communities in the affected region. To establish effective mitigation strategies, relevant data were collected from the affected areas with respect to the technical, social, and economic impact levels. The data analysis facilitated identifying the major factors, such as vulnerability, criticality, and severity, for developing a DSS. Customized mitigation strategies that will help agencies prepare, respond, and recover according to the disaster response were suggested.

  • PDF

The Design of The IPSec Association Simplification Scheme by Pre-Association Information Deployment (사전 협약 정보 배포를 이용한 IPSec 협약 간소화 기법의 설계)

  • Kim, Kwang Hyun;Gyeong, Gyehyeon;Zhen, Zhao;Eom, Young Ik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.1246-1249
    • /
    • 2007
  • IP(Internet Protocol)프로토콜에 기밀성과 무결성을 지원해 주기 위해 IPSec(IP Security) 프로토콜이 등장하였다. 이러한 IPSec 프로토콜은 안전한 통신채널을 만들기 위해 IKE(Internet Key Exchange) 프로토콜을 사용하고 있지만, IKE 프로토콜에서 이루어지는 협약단계의 복잡성 문제로 인하여 IPSec 프로토콜을 사용 할 수 없는 상황이 생기고 있다. 본 논문은 이러한 상황을 해결하기 위해 협약단계를 간소화 시킨 P-IPSec(이하 Premade IPSec)프로토콜을 제시한다. P-IPSec 프로토콜은 사전정보의 협약단계의 어려움을 줄이기 위해 IPSec 세션 설정에 참여하는 호스트들이 협상을 해야 하는 사전정보를 목적지 호스트에서 결정, 전송하는 방식을 사용하고 있다. P-IPSec 프로토콜은 사전정보 협상과 배포의 복잡성 문제로 인하여 IPSec 통신을 하지 못하는 호스트들에게 IPSec 통신을 할 수 있는 수단을 제공해 준다.

귀문(龜文)의 배경(背景) 소고(小考)

  • Gu, In-Suk
    • Journal of the Korean Society of Costume
    • /
    • v.9
    • /
    • pp.75-88
    • /
    • 1985
  • This study is on the expressive will of human beings by way of examining turtle patterns. Turtle represents spiritual, incantatory implications and the idea1s of long life and of fortune. From ancient to the present the turtle patterns have expressed various kinds of arts on these concepts. The researchs on the examples of turtle patterns are summed up as follows. 1. Single form of turtle shows a turtle wrapped by snakes and is generally regarded as a symbol of long life with respect to the mysteries of the Tao. 2. HyunMu type is of an imaginary animal which is wrapped by snakes. 3. Turtle shell type is hexagon accumulated 1ike successive bee-hives.

  • PDF

A Study on effects of favor in pizza added oregano and kimchi. (Oregano와 김치 첨가가 Pizza의 맛에 미치는 영향)

  • 조용범;박우포;정순경
    • Culinary science and hospitality research
    • /
    • v.6 no.2
    • /
    • pp.23-30
    • /
    • 2000
  • Kimchi was added to enhance the acceptability of pizza sauce and pizza for Korean adults, and flavor 1ike oregano was also mixed to investigate the compatibility with kimchi flavor. Pizza sauce with kimchi showed a high crude protein and low crude fat content. Pizza sauce with 20% kimchi showed the highest score in flavor, taste, color and overall acceptability, was significantly different from control in quality indices except taste. Pizza with 21, kimchi powder in mixing dough showed a higher score in sensory evaluation than that of only 20% kimchi added pizza sauce.

  • PDF

SPACE-LIKE SUBMANIFOLDS WITH CONSTANT SCALAR CURVATURE IN THE DE SITTER SPACES

  • Liu, Ximin
    • Journal of the Korean Mathematical Society
    • /
    • v.38 no.1
    • /
    • pp.135-146
    • /
    • 2001
  • Let M(sup)n be a space-ike submanifold in a de Sitter space M(sub)p(sup)n+p (c) with constant scalar curvature. We firstly extend Cheng-Yau's Technique to higher codimensional cases. Then we study the rigidity problem for M(sup)n with parallel normalized mean curvature vector field.

  • PDF

An Adaptive Control Method of Robot Manipulators using RBFN (RBFN을 이용한 로봇 매니퓰레이터의 적응제어 방법)

  • 이민중;최영규;박진현
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.420-420
    • /
    • 2000
  • In this paper, we propose an adaptive controller using RBFN(radial basis function network) for robot manipulators The structure of the proposed controller consists of a RBFN and VSC-1 ike control. RBFN is used in order to approximate かon system, and VSC-like control to guarantee robustness On the basis of the Lyapunov stability theorem, we guarantee the stability for the total system. And the learning law of RBFN is established by the Lyapunov method, Finally, we apply the proposed controller to tracking control for a 2 link SCARA type robot manipulator.

  • PDF