2004
DOI: 10.17487/rfc3830
|View full text |Cite
|
Sign up to set email alerts
|

MIKEY: Multimedia Internet KEYing

Abstract: MIKEY: Multimedia Internet KEYing Status of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
212
0
2

Year Published

2006
2006
2011
2011

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 172 publications
(214 citation statements)
references
References 0 publications
0
212
0
2
Order By: Relevance
“…Note that in [RFC3830], there is defined both a V payload (carrying the authentication tag) and a V flag in the HDR payload (indicating whether or not a response message is expected).…”
Section: Solid Arrows (----->) Indicate Mandatory Messages Dashed Armentioning
confidence: 99%
See 3 more Smart Citations
“…Note that in [RFC3830], there is defined both a V payload (carrying the authentication tag) and a V flag in the HDR payload (indicating whether or not a response message is expected).…”
Section: Solid Arrows (----->) Indicate Mandatory Messages Dashed Armentioning
confidence: 99%
“…The pre-shared key method and the public-key encryption method defined in [RFC3830] are examples of systems based on pre-distribution of user credentials. The DiffieHellman method [RFC3830] is an example of a system based on negotiation and exchange directly between peers.…”
Section: Design Considerationsmentioning
confidence: 99%
See 2 more Smart Citations
“…However, the establishment of multicast security associations (phase 2b) typically does not involve EAP and needs to be handled by a group key management protocol such as Group Domain of Interpretation (GDOI) [RFC3547], Group Secure Association Key Management Protocol (GSAKMP) [RFC4535], Multimedia Internet KEYing (MIKEY) [RFC3830], or Group Key Distribution Protocol (GKDP) [GKDP]. Several mechanisms have been proposed for the discovery of IPsec security gateways.…”
Section: Ikev2mentioning
confidence: 99%