关键词: 协议安全，VPN，IKE, 安全关联，密钥交换
As we increasingly rely on information infrastructure to support critical application, fear of security breaches to has been a major reason for the business world's reluctance to embrace the Internet as a viable means of communication. Aplication of formal methods to analyze security protocols is an important research subject in cryptography.
First this paper analysese the kinds of the factor which produce the problem of the network security。This paper discusses characteristics of security protocols and several important protocols in the development of this filed。
TCP/P, SPLCE/AS and IPSec architecture have been deeply studied in Chapter three. IKE protocol is introduced including the protocol framework, the process of negotiation, the format of IKE messages and the security performance of IKE protocol.
In conclusion, we can comprehend and implement the IPSec and IKE protocol more thoroughly and clearly through the introduction and analysis in the dissertation. More over, it can bring forward the probability of improvement of VPN
Key words: Security of protocol, VPN, IKE, Security Association, Key Exchange