12/29/23
IP Security
1. Overview
Course : 18AIC307T & Cryptography
2. Architecture
and Network Security 3. Authentication Header
UNIT 5 : IP Security & Intrusion Detection Systems 4. Encapsulating Security Payload
Faculty : Ms. NITHYASRI A, 5. Combining security Associations
Assistant Professor 6. Internet Key Exchange.
Department of Artificial Intelligence
MKCE
1 2
IP Security IPSec
have a range of application specific generalIP Security mechanisms
security mechanisms provides
◦ eg. S/MIME, PGP, Kerberos, SSL/HTTPS ◦ authentication
however there are security concerns that ◦ confidentiality
cut across protocol layers ◦ key management
would like security implemented by the applicable to use over LANs, across public
network for all applications & private WANs, & for the Internet
3 4
IPSec Uses Benefits of IPSec
in a firewall/router provides strong
security to all traffic crossing the
perimeter
in a firewall/router is resistant to bypass
is below transport layer, hence
transparent to applications
can be transparent to end users
can provide security for individual users
secures routing architecture
5 6
1
12/29/23
IP Security Architecture IPSec Services
specificationis quite complex Access control
defined in numerous RFC’s Connectionless integrity
◦ incl. RFC 2401/2402/2406/2408 Data origin authentication
◦ many others, grouped by category Rejection of replayed packets
mandatory in IPv6, optional in IPv4 ◦ a form of partial sequence integrity
Confidentiality (encryption)
have two security header extensions:
Limited traffic flow confidentiality
◦ Authentication Header (AH)
◦ Encapsulating Security Payload (ESP)
7 8
Security Associations Authentication Header (AH)
a one-way relationship between sender & providessupport for data integrity &
receiver that affords security for traffic authentication of IP packets
flow
◦ end system/router can authenticate user/app
defined by 3 parameters:
◦ prevents address spoofing attacks by tracking
◦ Security Parameters Index (SPI) sequence numbers
◦ IP Destination Address
based on use of a MAC
◦ Security Protocol Identifier
◦ HMAC-MD5-96 or HMAC-SHA-1-96
has a number of other parameters
◦ seq no, AH & EH info, lifetime etc parties must share a secret key
have a database of Security Associations
9 10
Authentication Header Transport & Tunnel Modes
11 12
2
12/29/23
Encapsulating Security Payload (ESP) Encapsulating Security Payload
provides message content confidentiality &
limited traffic flow confidentiality
can optionally provide the same authentication
services as AH
supports range of ciphers, modes, padding
◦ incl. DES, Triple-DES, RC5, IDEA, CAST etc
◦ CBC & other modes
◦ padding needed to fill blocksize, fields, for traffic flow
13 14
Transport vs Tunnel Mode ESP Combining Security Associations
transport mode is used to encrypt & SA’s can implement either AH or ESP
optionally authenticate IP data to implement both need to combine SA’s
◦ data protected but header left in clear ◦ form a security association bundle
◦ can do traffic analysis but is efficient ◦ may terminate at different or same endpoints
◦ good for ESP host to host traffic ◦ combined by
transport adjacency
tunnel mode encrypts entire IP packet iterated tunneling
◦ add new header for next hop issue
of authentication & encryption
◦ good for VPNs, gateway to gateway security order
15 16
Combining Security Associations Key Management
handles key generation & distribution
typically need 2 pairs of keys
◦ 2 per direction for AH & ESP
manual key management
◦ sysadmin manually configures every system
automated key management
◦ automated system for on demand creation of
keys for SA’s in large systems
◦ has Oakley & ISAKMP elements
17 18
3
12/29/23
Oakley ISAKMP
a key exchange protocol Internet Security Association and Key
based on Diffie-Hellman key exchange Management Protocol
adds features to address weaknesses provides framework for key management
◦ cookies, groups (global params), nonces, DH defines procedures and packet formats to
key exchange with authentication establish, negotiate, modify, & delete SAs
can use arithmetic in prime fields or independent of key exchange protocol,
elliptic curve fields encryption alg, & authentication method
19 20
ISAKMP ISAKMP Payloads & Exchanges
have a number of ISAKMP payload types:
◦ Security, Proposal, Transform, Key,
Identification, Certificate, Certificate, Hash,
Signature, Nonce, Notification, Delete
ISAKMP has framework for 5 types of
message exchanges:
◦ base, identity protection, authentication only,
aggressive, informational
21 22