Internet Protocol Protection
Hasan Mohamed AL Gghammoudy 1 , Salma Ali Attayeb2

The main purpose of this paper is to study the security of the Internet Protocol and the method of exchanging keys, extract weaknesses in them, and provide appropriate solutions. The second goal is to find another more reliable way to share the Diffie-Hellmankey.The search takes the following steps; Background study of Internet Protocol security)IPSec(, Study the key exchange protocol (IKE), Discuss the application of the algorithm Diffie-Hellman. Through these steps we reached; Identify weaknesses and problems related to those methods, Optimal methods for distribution of public keys, Provide another, more reliable way to share the Diffie-Hellman key, Improved Harn's and phan protocols for Diffie-Hellman interchange protocols that are integrated into the digital signature algorithm, The authentication is provided before the public keys, and then developed our idea of optimizing the integrated Diffie-Hellman-DSAkey exchange protocol. use internal encryption keys to increase confidentiality.

Download