What is Internet Key Exchange (IKE), and how does it work? (2024)

By

  • Andrew Zola
  • Alexander S. Gillis,Technical Writer and Editor

What is Internet Key Exchange (IKE)?

Internet Key Exchange (IKE) is a standard protocol used to set up a secure and authenticated communication channel between two parties via a virtual private network (VPN). The protocol ensures security for VPN negotiation, remote host and network access.

A critical role of IKE is negotiating security associations (SAs) for IP Security (IPsec). SAs are security policies defined for communication between two or more entities. A set of algorithms and mutually agreed-upon keys are used and represented by both parties when attempting to establish a VPN tunnel or connection.

There are two versions of IKE standards:

  1. IKE protocol defined in RFC 2409
  2. IKE version 2 (IKEv2) defined in RFC 7296

Most often, IKE uses X.509 public key infrastructure (PKI) certificates for authentication and a Diffie-Hellman key exchange protocol to establish a shared secret session.

A hybrid protocol, IKE, also implements two earlier security protocols, Oakley and SKEME, within an Internet Security Association and Key Management Protocol (ISAKMP) TCP/IP-based framework.

The SKEME protocol is an alternate version for the exchange key. ISAKMP RFC 2408 is used for negotiations, establishing security associations and securing connections between IPsec peers, specifying the framework for key exchange and authentication. Oakley RFC 2412 is used for key agreements or exchanges and defines the mechanism used over the IKE session for key exchange. Diffie-Hellman is the default algorithm used for exchange.

What is Internet Key Exchange (IKE), and how does it work? (1)

How does IKE work in IPsec?

IKE is a part of IPsec, a suite of protocols and algorithms used to secure sensitive data transmitted across a network. The Internet Engineering Task Force (IETF) developed IPsec to provide security through authentication and encryption of IP network packets and secure VPNs.

In IPsec, IKE defines an automatic means of negotiation and authentication for IPsec SAs. This is required for the encryption and decryption process because it negotiates security. IKE offers several benefits for IPsec configuration, including automatic negotiation and authentication, anti-replay services, certification authority support and the ability to change encryption keys during an IPsec session.

The IKE protocol uses User Datagram Protocol (UDP) packets to create an SA, generally needing four to six packets with two to three messages. An IPsec stack intercepts relevant IP packets, encrypting and decrypting them as needed.

Understanding phase 1 and phase 2 of IKE

The original version of IKE sets up secure communications channels in two phases: phase 1 and phase 2.

In phase 1, an authenticated connection between the host and user is established using a preshared key or a digital certificate. The goal is to secure the communications that occur in phase 2. The Diffie-Hellman key exchange algorithm creates a secure authentication communication channel. This digital encryption method uses numbers raised to specific powers to produce decryption keys. The negotiation should result in session keys and one bidirectional SA.

Phase 1 operates under one of two modes: main mode or aggressive mode. The main mode consists of both parties sending three two-way exchanges equaling six messages in total. The first two messages confirm encryption and authentication algorithms. The second set of two messages starts a Diffie-Hellman key exchange, where both parties provide a random number. The third set of messages verifies the identities of each party.

Aggressive mode accomplishes the same task as the main mode but does so in just two exchanges of three messages. Whereas the main mode protects both parties' identities by encrypting them, the aggressive mode does not.

Phase 2 of IKE negotiates an SA to secure the data that travels through IPsec, using the secure channel created in phase 1. The result is a minimum of two SAs that are unidirectional. Both parties also exchange proposals to determine which security parameter to use in the SA.

Phase 2 operates in only one mode: quick mode. Quick mode provides three resources: proxy IDs, perfect forward secrecy (PFS) and replay protection. The proxy IDs of each participant are shared with each other. PFS delivers keys independent from preceding keys. Replay protection is a security method to protect against replay attacks.

The main and aggressive modes found in phase 1 only apply to IKE version 1 and not to IKE version 2.

What is Internet Key Exchange (IKE), and how does it work? (2)

What is IKE version 2, and what are its improvements?

IKEv1 came out in 1998 and was followed by the released IKEv2 in 2005. IKEv2, updated in 2014, negotiates and authenticates IPsec SAs and provides secure VPN communication channels between devices. This version does not include phases 1 or 2 like its predecessor, but message exchanges still negotiate an IPsec tunnel. The first of the four messages is a negotiation to decide a security attribute. The second is where each party authenticates its identity. The third includes the creation of additional SAs. The fourth message removes SA relationships, detects IPsec tunnel liveliness and reports errors.

Improvements in IKEv2 over IKEv1 are as follows:

  • requires less bandwidth;
  • demands fewer cryptographic mechanisms to protect packets;
  • requires only one four-message initial exchange mechanism;
  • supports mobile platforms, including smartphones;
  • supports the securing of Stream Control Transmission Protocol (SCTP) traffic;
  • provides more resistance to denial-of-service (DoS) attacks;
  • comes equipped with the built-in Network Address Translation (NAT) traversal needed to support routers that perform translations;
  • detects automatically if an IPsec tunnel is still live so that IKE can automatically reestablish a connection if needed;
  • enables message fragmentation and allows IKEv2 to operate in areas where IP fragments might be blocked and an SA may fail to establish; and
  • enables rekeying to build new keys for SA.

What are the advantages of using IKE?

IKE includes the following benefits:

  • automatic negotiation and authentication;
  • anti-replay services;
  • ability to change encryption keys during an IPsec session;
  • calculating shared keys;
  • fast connection speeds using NAT and NAT traversal;
  • attempts to restore a connection whenever the connection drops;
  • supports a variety of devices, including desktops and smartphones; and
  • prevents DoS and replay attacks.

What are the potential challenges of using IKE?

IKE may pose the following challenges:

  • IKEv1 is vulnerable to Bleichenbacher attacks, which obtain information about a device based on the device's response to receiving a modified ciphertext. IOS and Cisco Systems still support IKEv1.
  • Using IKEv2 in some operating systems (OS) may require users to make additional manual configurations. For example, if IKE in Junos OS is not explicitly configured, Junos OS defaults to version 1 of IKE.

There is also a chance that a firewall or a network administrator could block IKEv2's UDP port, causing a VPN to stop working.

What is an L2TP IP VPN Internet Key Exchange?

Internet Service Providers (ISPs) use Layer Two Tunneling Protocol (L2TP) to enable VPN operations. By using IKE, this networking protocol negotiates and authenticates secure VPN connections.

Learn the difference between site-to-site and remote access VPNs and the benefits and use cases for each.

This was last updated in February 2022

Continue Reading About Internet Key Exchange (IKE)

  • Choosing between an SSL/TLS VPN vs. IPsec VPN
  • IPsec vs. SSL VPN: Comparing speed, security risks and technology
  • What's the difference between GRE and IPsec tunnels?
  • Managing VPN bandwidth requirements, speed and overhead
  • Why the Bleichenbacher attack is still around

Related Terms

What is cloud detection and response (CDR)?
Cloud computing requires a security approach that is different than traditional protections. Where does cloud detection and ...Seecompletedefinition
What is dynamic application security testing (DAST)?
Dynamic application security testing (DAST) is the process of analyzing a web application in runtime to identify security ...Seecompletedefinition
What is static application security testing (SAST)?
Static application security testing (SAST) is the process of analyzing and testing application source code for security ...Seecompletedefinition

Dig Deeper on Application and platform security

What is Internet Key Exchange (IKE), and how does it work? (2024)

FAQs

What is Internet Key Exchange (IKE), and how does it work? ›

Internet Key Exchange

Key Exchange
Key exchange (also key establishment) is a method in cryptography by which cryptographic keys are exchanged between two parties, allowing use of a cryptographic algorithm. In the Diffie–Hellman key exchange scheme, each party generates a public/private key pair and distributes the public key.
https://en.wikipedia.org › wiki › Key_exchange
(IKE) is a secure key management protocol that is used to set up a secure, authenticated communications channel between two devices. IKE does the following: Negotiates and manages IKE and IPsec parameters. Authenticates secure key exchange.

How does Internet Key Exchange IKE work? ›

IKE automates the negotiation and establishment of Security Associations (SAs) in IPsec for secure VPN connections. It ensures both parties in the communication use a common set of encryption and authentication methods, enabling the secure exchange of information.

How does key exchange work? ›

Known as the Diffie-Hellman key exchange, the encryption key can be openly communicated as it poses no risk to the confidentiality of encrypted messages. One party exchanges the keys to another party where they can then encrypt messages using the key and send back the cipher text.

What is the Diffie-Hellman key exchange and how does it work? ›

Diffie-Hellman key exchange's goal is to securely establish a channel to create and share a key for symmetric key algorithms. Generally, it's used for encryption, password-authenticated key agreement and forward security. Password-authenticated key agreements are used to prevent man-in-the-middle (MitM) attacks.

What is an Internet key? ›

A network security key is the password you enter to connect to a Wi-Fi network. It establishes a connection between the router and the devices that connect to the Wi-Fi network. A network security key helps protect a Wi-Fi network and the people using it from snoops or intruders trying to piggyback on your connection.

How do Internet exchanges work? ›

An Internet eXchange Point (IXP) is a physical location through which Internet infrastructure companies such as Internet Service Providers (ISPs), CDNs, web enterprises, communication service providers, cloud and SaaS providers connect to exchange Internet traffic.

What port does IKE use? ›

The IKE protocol uses UDP packets, usually on port 500, and generally requires 4–6 packets with 2–3 round trips to create an ISAKMP security association (SA) on both sides. The negotiated key material is then given to the IPsec stack.

What is the best key exchange? ›

The two most popular key exchange algorithms are RSA and Diffie-Hellman (now known as Diffie-Helmlman-Merkle).

What is an example of a key exchange protocol? ›

The key exchange protocol is considered an important part of cryptographic mechanism to protect secure end-to-end communications. An example of key exchange protocol is the Diffie and Hellman key exchange [DIF 06, STA 10], which is known to be vulnerable to attacks.

What are the different types of key exchange? ›

Two different types of key exchange that can be suggested are symmetric and Asymmetric encryption. The first one is the most commonly used since one of its advantages is to use less computing processing witch makes it a faster method, ideal for traffic with large amounts of data.

What is the problem with Diffie-Hellman key exchange? ›

The Diffie-Hellman key exchange algorithm is vulnerable to the man-in-the-middle (intruder-in- the middle or person-in-middle) attack. For example, if Beth is able to insert herself into the channel and receive and stop transmission between Alex and Nick, then she can do this.

Which DH group is most secure? ›

Answer: The most secure Diffie-Hellman group is currently considered to be Group 24 (2048-bit ECP) or higher, offering stronger encryption and resistance to attacks.

Is the Diffie-Hellman key exchange safe? ›

While the Diffie-Hellman key exchange may seem complex, it is a fundamental part of securely exchanging data online. As long as it is implemented alongside an appropriate authentication method and the numbers have been selected properly, it is not considered vulnerable to attack.

What is the IKE process? ›

Internet Key Exchange (IKE) is a secure key management protocol that is used to set up a secure, authenticated communications channel between two devices. IKE does the following: Negotiates and manages IKE and IPsec parameters. Authenticates secure key exchange.

What is the role of IKE? ›

Internet Key Exchange (IKE) is a standard protocol used to set up a secure and authenticated communication channel between two parties via a virtual private network (VPN). The protocol ensures security for VPN negotiation, remote host and network access.

What is the first phase of the IKE Internet Key Exchange Protocol? ›

IKE Modes (Phase 1)

The first exchange between nodes establishes the basic security policy; the initiator proposes the encryption and authentication algorithms to be used.

How does signal key exchange work? ›

It is a key agreement protocol that allows two parties, each having an elliptic-curve public–private key pair, to establish a shared secret over an insecure channel. This shared secret may be directly used as a key, or to derive another key.

How does Dragonfly key exchange work? ›

Dragonfly is Password Authenticated Key Exchange protocol that uses a shared session key to authenticate parties based on pre-shared secret password.

How does IKEv2 work? ›

Working together, IKEv2 uses a few data packets to establish a security association with the server. It then takes all the data — the IP addresses, the security measures used, and the ports utilized in the connection — and gives it to IPsec, which then uses the security associations to encrypt the traffic.

Top Articles
13 Most Profitable Business Niches | Jatinder Palaha - Digital Business Strategist, Consultant, Coach
How to Get a 900 Credit Score in Canada
Spectrum Gdvr-2007
Dunhams Treestands
What are Dietary Reference Intakes?
Erskine Plus Portal
Xrarse
Osrs But Damage
Tlc Africa Deaths 2021
Kagtwt
Missing 2023 Showtimes Near Landmark Cinemas Peoria
Power Outage Map Albany Ny
Sports Clips Plant City
24 Hour Walmart Detroit Mi
Missing 2023 Showtimes Near Landmark Cinemas Peoria
Conan Exiles Colored Crystal
Highland Park, Los Angeles, Neighborhood Guide
Carolina Aguilar Facebook
Find Such That The Following Matrix Is Singular.
How Much Is Tay Ks Bail
Lawson Uhs
Our History
Kayky Fifa 22 Potential
Pickswise Review 2024: Is Pickswise a Trusted Tipster?
Lowes Undermount Kitchen Sinks
Hobby Stores Near Me Now
Universal Stone Llc - Slab Warehouse & Fabrication
Touchless Car Wash Schaumburg
Okc Body Rub
Sadie Sink Reveals She Struggles With Imposter Syndrome
Devotion Showtimes Near Regency Buenaventura 6
Makemv Splunk
Best Middle Schools In Queens Ny
Water Temperature Robert Moses
Soul Eater Resonance Wavelength Tier List
2011 Hyundai Sonata 2 4 Serpentine Belt Diagram
Visit the UK as a Standard Visitor
Why comparing against exchange rates from Google is wrong
What Is Opm1 Treas 310 Deposit
How often should you visit your Barber?
Indiefoxx Deepfake
Mistress Elizabeth Nyc
Greater Keene Men's Softball
Scanning the Airwaves
Suffix With Pent Crossword Clue
Subdomain Finder
Payrollservers.us Webclock
Fairbanks Auto Repair - University Chevron
Menu Forest Lake – The Grillium Restaurant
Premiumbukkake Tour
Electronics coupons, offers & promotions | The Los Angeles Times
Latest Posts
Article information

Author: Melvina Ondricka

Last Updated:

Views: 5949

Rating: 4.8 / 5 (68 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Melvina Ondricka

Birthday: 2000-12-23

Address: Suite 382 139 Shaniqua Locks, Paulaborough, UT 90498

Phone: +636383657021

Job: Dynamic Government Specialist

Hobby: Kite flying, Watching movies, Knitting, Model building, Reading, Wood carving, Paintball

Introduction: My name is Melvina Ondricka, I am a helpful, fancy, friendly, innocent, outstanding, courageous, thoughtful person who loves writing and wants to share my knowledge and understanding with you.