Where OAKLEY and SKEME come to play?

Where OAKLEY and SKEME come to play?

Where OAKLEY and SKEME come to play?

A.
IKE

B.
ISAKMP

C.
DES

Explanation:
The Oakley Key Determination Protocol is a key-agreement protocol that allows authenticated
parties to exchange keying material across an insecure connection using the DiffieHellman
key exchange algorithm.
The protocol was proposed by Hilarie K. Orman in 1998, and formed the basis for the more
widely used Internet key exchange protocol
https://en.wikipedia.org/wiki/Oakley_protocol
IKE (Internet Key Exchange)
A key management protocol standard that is used in conjunction with the IPSec standard.
IPSec is an IP security feature that provides robust authentication and encryption of IP
packets. IPSec can be configured without IKE, but IKE enhances IPSec by providing
additional features, flexibility, and ease of configuration for the IPSec standard. IKE is a hybrid
protocol that implements the Oakley key exchange and Skeme key exchange inside of the
Internet Security Association and Key Management Protocol (ISAKMP) framework.
ISAKMP, Oakley, and Skeme are security protocols implemented by IKE
https://www.symantec.com/security_response/glossary/define.jsp?letter=i&word=ike-internetkey- exchange



Leave a Reply 0

Your email address will not be published. Required fields are marked *