Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Advantage of IKE over SKIP

Posted on 2004-05-03
2
Medium Priority
?
287 Views
Last Modified: 2010-04-11
Does anyone knows the advantages IKE has over SKIP in key management?

0
Comment
Question by:acrilas
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 6

Accepted Solution

by:
bloemkool1980 earned 150 total points
ID: 10976067
yes pki is widely accepted in many application where SKIP is not always possible to identify a client for example.
PKI has a better structure for maintaining your certificates.
0
 
LVL 23

Expert Comment

by:Tim Holman
ID: 10976182
Some bedtime reading:

http://www.garykessler.net/library/crypto.html

http://www-106.ibm.com/developerworks/library/s-skip.html

Not so many people use SKIP any more - most mass-produced commercial devices will not support this, and it's only the advanced enterprise VPN devices like Check Point and PIX that offer this feature.
So, although SKIP is faster, IKE is predominant in the market as has multi-vendor support.  
0

Featured Post

What does it mean to be "Always On"?

Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Check out what's been happening in the Experts Exchange community.
What we learned in Webroot's webinar on multi-vector protection.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question