Oakley protocol: Difference between revisions
Appearance
Content deleted Content added
m →External links: Update the RFC links |
No edit summary |
||
Line 5: | Line 5: | ||
| date=March 2009 |
| date=March 2009 |
||
| publisher=[[TechTarget]] |
| publisher=[[TechTarget]] |
||
| accessdate=2015-09-28}}</ref><ref>{{Cite journal |last=Carrel |first=David |last2=Harkins |first2=Dan |date=1998-11-02 |title=The Internet Key Exchange (IKE) |url=http://thenewscrypto.com/ |journal=}}</ref> |
|||
| accessdate=2015-09-28}}</ref> |
|||
The Oakley protocol has also been implemented in [[Cisco Systems]]' [[ISAKMP]] [[daemon (computer software)|daemon]].<ref>{{cite web |
The Oakley protocol has also been implemented in [[Cisco Systems]]' [[ISAKMP]] [[daemon (computer software)|daemon]].<ref>{{cite web |
Latest revision as of 06:07, 22 May 2023
The Oakley Key Determination Protocol is a key-agreement protocol that allows authenticated parties to exchange keying material across an insecure connection using the Diffie–Hellman key exchange algorithm. The protocol was proposed by Hilarie K. Orman in 1998, and formed the basis for the more widely used Internet Key Exchange protocol.[1][2]
The Oakley protocol has also been implemented in
daemon.[3]
References
- ^ Margaret Rouse (March 2009). "What is Internet Key Exchange?". TechTarget. Retrieved 2015-09-28.
- ^ Carrel, David; Harkins, Dan (1998-11-02). "The Internet Key Exchange (IKE)".
{{cite journal}}
: Cite journal requires|journal=
(help) - Cisco Systems. 2008-01-14. Retrieved 2015-09-28.