Sciweavers

CSREASAM
2004

Experimental Analysis of the Arcanum Key Exchange Protocol

14 years 1 months ago
Experimental Analysis of the Arcanum Key Exchange Protocol
A VPN establishes a secure network using the insecure media of the Internet. However, before a VPN can be established keys must be exchanged between the communicating peers. In this paper, we present the implementation details of the Arcanum key exchange protocol along with its experimental analysis. We simulated a number of active and passive attacks in order to test the robustness and efficiency of the protocol. Our results show that Arcanum protocol is robust against passive eavesdropping, reflection attack, replay attack, redirection attack, man-in-the-middle attack and DoS attacks.
Ajmal S. Mian, Raja Iqbal
Added 30 Oct 2010
Updated 30 Oct 2010
Type Conference
Year 2004
Where CSREASAM
Authors Ajmal S. Mian, Raja Iqbal
Comments (0)