[4]Usually, IKE is used in IPsec to manage Security Association, it has two steps: establish of ISAKMP SA, and establish of IPsec SA. IKE generates secret keys bases on Diffie-Hellman Exchange which is experiential rather than mathematical. So, it is possible to find out IKE leakage and thus obtain encryption and authentication.