Internet Key Exchange (IKE) is the protocol used to set up a secure, authenticated communications channel between two parties. IKE typically uses X.509 PKI certificates for authentication and the Diffie–Hellman key exchange protocol to set up a shared session secret.
IKE is part of the Internet Security Protocol (IPSec) which is responsible for negotiating security associations (SAs), which are a set of mutually agreed-upon keys and algorithms to be used by both parties trying to establish a VPN connection/tunnel.
IKE is comprised of two phases. In phase 1, IKE creates an authenticated, secure channel between the two IKE peers. This is done using the Diffie-Hellman key agreement protocol. IKE supports multiple authentication methods as part of the phase 1 exchange. Methods include:
- Pre-shared keys. A key value entered into each peer manually (out of band) and used to authenticate the peer.
- RSA signatures. Uses a digital certificate authenticated by an RSA signature.
- RSA encrypted nonces. Uses RSA encryption to encrypt a nonce value (a random number generated by the peer).
In phase 2, IKE negotiates the IPSec security associations and generates the required key material for IPSec.
See also key distribution center.