A VPN establishes a secure network using the insecure media of the Internet. However, before a VPN can be established keys must be exchanged between the communicating peers. In this paper, we present the implementation details of the Arcanum key exchange protocol along with its experimental analysis. We simulated a number of active and passive attacks in order to test the robustness and efficiency of the protocol. Our results show that Arcanum protocol is robust against passive eavesdropping, reflection attack, replay attack, redirection attack, man-in-the-middle attack and DoS attacks.
Ajmal S. Mian, Raja Iqbal