All Questions
Tagged with ike cryptography
2
questions
1
vote
1
answer
287
views
Does a leaked pre-shared key make the initial IKE phase 1 negotiation of Diffie Hellman vulnerable?
A pre-shared key is used for authenticating the peers and also used in protecting the DH key exchange because it's possible to man in the middle the DH exchange.
Does this mean that if an attacker ...
3
votes
1
answer
1k
views
PFS incentive during IKE Phase 2
I'm trying to see the actual point in implementing Perfect Forward Secrecy during Internet Key Exchange Phase 2, if it had already been used during Phase 1.
Quoting the IKEv2 RFC:
RFC 5596
3.3.2. ...