Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
20 views4 pages

Unit 5

The document discusses IP security (IPSec) which provides authentication, confidentiality, and key management for IP packets. IPSec uses authentication headers or encapsulating security payloads to provide these services and defines security associations between endpoints to manage keys and encryption. The Internet Security Association and Key Management Protocol (ISAKMP) provides a framework for automated key exchange and management of security associations.

Uploaded by

Nithyasri A
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views4 pages

Unit 5

The document discusses IP security (IPSec) which provides authentication, confidentiality, and key management for IP packets. IPSec uses authentication headers or encapsulating security payloads to provide these services and defines security associations between endpoints to manage keys and encryption. The Internet Security Association and Key Management Protocol (ISAKMP) provides a framework for automated key exchange and management of security associations.

Uploaded by

Nithyasri A
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

12/29/23

IP Security
1. Overview
Course : 18AIC307T & Cryptography
2. Architecture
and Network Security 3. Authentication Header
UNIT 5 : IP Security & Intrusion Detection Systems 4. Encapsulating Security Payload
Faculty : Ms. NITHYASRI A, 5. Combining security Associations
Assistant Professor 6. Internet Key Exchange.
Department of Artificial Intelligence

MKCE

1 2

IP Security IPSec
— have a range of application specific — generalIP Security mechanisms
security mechanisms — provides
◦ eg. S/MIME, PGP, Kerberos, SSL/HTTPS ◦ authentication
— however there are security concerns that ◦ confidentiality
cut across protocol layers ◦ key management
— would like security implemented by the — applicable to use over LANs, across public
network for all applications & private WANs, & for the Internet

3 4

IPSec Uses Benefits of IPSec


— in a firewall/router provides strong
security to all traffic crossing the
perimeter
— in a firewall/router is resistant to bypass
— is below transport layer, hence
transparent to applications
— can be transparent to end users
— can provide security for individual users
— secures routing architecture

5 6

1
12/29/23

IP Security Architecture IPSec Services


— specificationis quite complex — Access control
— defined in numerous RFC’s — Connectionless integrity
◦ incl. RFC 2401/2402/2406/2408 — Data origin authentication
◦ many others, grouped by category — Rejection of replayed packets
— mandatory in IPv6, optional in IPv4 ◦ a form of partial sequence integrity
— Confidentiality (encryption)
— have two security header extensions:
— Limited traffic flow confidentiality
◦ Authentication Header (AH)
◦ Encapsulating Security Payload (ESP)

7 8

Security Associations Authentication Header (AH)


—a one-way relationship between sender & — providessupport for data integrity &
receiver that affords security for traffic authentication of IP packets
flow
◦ end system/router can authenticate user/app
— defined by 3 parameters:
◦ prevents address spoofing attacks by tracking
◦ Security Parameters Index (SPI) sequence numbers
◦ IP Destination Address
— based on use of a MAC
◦ Security Protocol Identifier
◦ HMAC-MD5-96 or HMAC-SHA-1-96
— has a number of other parameters
◦ seq no, AH & EH info, lifetime etc — parties must share a secret key
— have a database of Security Associations

9 10

Authentication Header Transport & Tunnel Modes

11 12

2
12/29/23

Encapsulating Security Payload (ESP) Encapsulating Security Payload


— provides message content confidentiality &
limited traffic flow confidentiality
— can optionally provide the same authentication
services as AH
— supports range of ciphers, modes, padding
◦ incl. DES, Triple-DES, RC5, IDEA, CAST etc
◦ CBC & other modes
◦ padding needed to fill blocksize, fields, for traffic flow

13 14

Transport vs Tunnel Mode ESP Combining Security Associations


— transport mode is used to encrypt & — SA’s can implement either AH or ESP
optionally authenticate IP data — to implement both need to combine SA’s
◦ data protected but header left in clear ◦ form a security association bundle
◦ can do traffic analysis but is efficient ◦ may terminate at different or same endpoints
◦ good for ESP host to host traffic ◦ combined by
– transport adjacency
— tunnel mode encrypts entire IP packet – iterated tunneling
◦ add new header for next hop — issue
of authentication & encryption
◦ good for VPNs, gateway to gateway security order

15 16

Combining Security Associations Key Management


— handles key generation & distribution
— typically need 2 pairs of keys
◦ 2 per direction for AH & ESP
— manual key management
◦ sysadmin manually configures every system
— automated key management
◦ automated system for on demand creation of
keys for SA’s in large systems
◦ has Oakley & ISAKMP elements

17 18

3
12/29/23

Oakley ISAKMP
—a key exchange protocol — Internet Security Association and Key
— based on Diffie-Hellman key exchange Management Protocol
— adds features to address weaknesses — provides framework for key management
◦ cookies, groups (global params), nonces, DH — defines procedures and packet formats to
key exchange with authentication establish, negotiate, modify, & delete SAs
— can use arithmetic in prime fields or — independent of key exchange protocol,
elliptic curve fields encryption alg, & authentication method

19 20

ISAKMP ISAKMP Payloads & Exchanges


— have a number of ISAKMP payload types:
◦ Security, Proposal, Transform, Key,
Identification, Certificate, Certificate, Hash,
Signature, Nonce, Notification, Delete
— ISAKMP has framework for 5 types of
message exchanges:
◦ base, identity protection, authentication only,
aggressive, informational

21 22

You might also like