Solved

Advantage of IKE over SKIP

Posted on 2004-05-03
2
274 Views
Last Modified: 2010-04-11
Does anyone knows the advantages IKE has over SKIP in key management?

0
Comment
Question by:acrilas
2 Comments
 
LVL 6

Accepted Solution

by:
bloemkool1980 earned 50 total points
ID: 10976067
yes pki is widely accepted in many application where SKIP is not always possible to identify a client for example.
PKI has a better structure for maintaining your certificates.
0
 
LVL 23

Expert Comment

by:Tim Holman
ID: 10976182
Some bedtime reading:

http://www.garykessler.net/library/crypto.html

http://www-106.ibm.com/developerworks/library/s-skip.html

Not so many people use SKIP any more - most mass-produced commercial devices will not support this, and it's only the advanced enterprise VPN devices like Check Point and PIX that offer this feature.
So, although SKIP is faster, IKE is predominant in the market as has multi-vendor support.  
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

February 24, 2017 — On February 23, Travis Ormandy, a vulnerability researcher at Google, reported on Twitter (https://twitter.com/taviso/status/834900838837411840) that massive stores of data have been leaked by CloudFlare, a company that provide…
It’s the first day of March, the weather is starting to warm up and the excitement of the upcoming St. Patrick’s Day holiday can be felt throughout the world.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

766 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question