SlideShare uma empresa Scribd logo
1 de 45
Blekinge Institute of Technology




                      IP Security
Outline

•   Passive Attacks
•   IP Security Overview
       IP Security Architecture
       Security Associations (SA)
       Authentication Header
       Encapsulating Security Payload (ESP)
•   Internet Key Exchange
     Key Management Protocosl
         – Oakley
         – ISAKMP
     Authentication Methods
         – Digital signatures
         – Public Key Encryption
         – Symmetric Key Encryption



     Blekinge Institute of Technology
                                         Network Security
                                                            2
Recommended TCP/IP Reading

•   Comer, D. Internetworking with TCP/IP, Volume                I:
    Principles, Protocols and Architecture. Prentic Hall, 1995

•   Stevens, W. TCP/IP Illustrated, Volume 1: The Protocols.
    Addison-Wesley, 1994




    Blekinge Institute of Technology
                                       Network Security
                                                                      3
Passive Attacks




Blekinge Institute of Technology
                                   ET1318 - Network Security
                                                               4
Interception




         Source                                                 Dest




                                        Darth

                        This is an attack on confidentiality


Blekinge Institute of Technology
                                    ET1318 - Network Security
                                                                       5
TCP/IP Example




Blekinge Institute of Technology
                                    Network Security
                                                       6
IP Security (Ipsec) Overview
•   General framework that allows a pair of communicating entities to
    use a set of algorithm for secure communication.

•   Not a single protocol but Protocol suite for securing Internet Protocol
    (IP) communications by
     authenticating
     encrypting
    each IP packet of a communication session.

•   includes protocols for establishing mutual authentication between a
    pair of communicating entities at the
     beginning of the session
     negotiation of cryptographic keys to be used during the session.



      Blekinge Institute of Technology
                                         Network Security
                                                                              7
IP Security Overview
•   Encrypt and/or authenticate all traffic at IP level. Thus, applications,
    e-mail, file transfer, WEB access can be secured.
     Applications do not need to be specifically designed to use IPsec.


•   Applications of IPSec/VPN
       Secure branch office connectivity over the Internet
       Secure remote access over the Internet
       Establishing connectivity with partners
       Enhancing electronic commerce security




        Blekinge Institute of Technology
                                           Network Security
                                                                               8
IP Security Scenario




Blekinge Institute of Technology
                                   Network Security
                                                      9
IP Security Overview

•   Benefits of IPSec
     Transparent to applications (below transport layer (TCP, UDP))
     Provide security for individual users


•   IPSec can assure that:
     A router or neighbor advertisement comes from an authorized router
     A redirect message comes from the router to which the initial packet was
      sent
     A routing update is not forged




      Blekinge Institute of Technology
                                         Network Security
                                                                                 10
IP Security Architecture

•   IPSec documents:
      RFC 2401: An overview of security architecture
      RFC 2402: Description of a packet authentication extension to IPv4 and
       IPv6
      RFC 2406: Description of a packet encryption extension to IPv4 and
       IPv6
      RFC 2408: Specification of key management capabilities


•   IPsec uses the following protocols to perform various functions
      Authentication Headers (AH)
      Encapsulating Security Payloads (ESP)
      Security associations (SA)




      Blekinge Institute of Technology
                                         Network Security
                                                                                11
IPSec modes of operation

•   IPSec can be implemented in a
     host-to-host transport mode
         – Only the payload of the IP packet is encrypted and/or authenticated.
         – The routing is intact, since the IP header is neither modified nor encrypted.
         – Transport mode is used for host-to-host communications.

     network tunnel mode
         – The entire IP packet is encrypted and/or authenticated. It is then encapsulated
           into a new IP packet with a new IP header.
         – Tunnel mode is used to create virtual private networks (VPN) for network-to-
           network communications (e.g. between routers to link sites), host-to-network
           communications (e.g. remote user access), and host-to-host communications
           (e.g. private chat).




      Blekinge Institute of Technology
                                         Network Security
                                                                                             12
Security associations (SA)

•   A security association is simply the bundle of algorithms and
    parameters (such as keys)
     used to encrypt and authenticate a particular flow in one direction (AH and/or ESP
      operations).
     In bi-directional traffic, the flows are secured by a pair of security associations.


•   Security associations are established using the ISAKMP (Internet
    Security Association and Key Management Protocol)
     ISAKMP defines the procedures for authenticating a communicating peer, creation
      and management of Security Associations, key generation techniques, and threat
      mitigation (e.g. denial of service and replay attacks).(From Wikipedia)




      Blekinge Institute of Technology
                                         Network Security
                                                                                             13
Security Associations (SA)

•   A one way relationship between a sender and a receiver.
•   To decide what protection - for an outgoing packet, Ipsec is
    identified by three parameters:
      Security Parameter Index (SPI)
      IP Destination address
      Security Protocol Identifier (is it an AH or an ESP?)
     (Similar procedure for an incoming packet)




      Blekinge Institute of Technology
                                         Network Security
                                                                   14
SA Parameters

•   A SA is defined by the following parameters:
        Sequence Number Counter
        Sequence Counter Overflow
        Anti-replay Window
        AH Information
        ESP Information
        Lifetime of this SA
        IPSec protocol mode (Tunnel or Transport?)
        Path MTU




     Blekinge Institute of Technology
                                        Network Security
                                                           15
Combinations of Security Associations




Blekinge Institute of Technology
                                   Network Security
                                                      16
Combinations of Security Associations




Blekinge Institute of Technology
                                   Network Security
                                                      17
Combinations of Security Associations




Blekinge Institute of Technology
                                   Network Security
                                                      18
Combinations of Security Associations




Blekinge Institute of Technology
                                   Network Security
                                                      19
IPSec Document Overview




Blekinge Institute of Technology
                                   Network Security
                                                      20
Authentication Header

•   Access Control
•   Integrity
•   Data origin authentication
•   Rejection of replayed packets
•   Confidentiality (encryption)




      Blekinge Institute of Technology
                                         Network Security
                                                            21
Before applying AH




Blekinge Institute of Technology
                                   Network Security
                                                      22
Transport Mode (AH Authentication)




Blekinge Institute of Technology
                                   Network Security
                                                      23
Tunnel Mode (AH Authentication)




Blekinge Institute of Technology
                                   Network Security
                                                      24
End-to-end versus End-to-Intermediate
               Authentication




Blekinge Institute of Technology
                                   Network Security
                                                      25
Encapsulating Security Payload
•   Provides
      origin authenticity
      integrity
      confidentiality protection of packets.

•   ESP supports encryption-only and authentication-only
      using encryption without authentication is strongly discouraged
       because it is insecure
•   ESP does not protect the IP packet header.
•   Tunnel Mode :
      the entire original IP packet is encapsulated with a new packet
       header added
      ESP protection is afforded to the whole inner IP packet (including
       the inner header) while the outer header remains unprotected.
•   ESP provides confidentiality services

    Blekinge Institute of Technology
                                       Network Security
                                                                            26
Encapsulating Security Payload




Blekinge Institute of Technology
                                   Network Security
Encryption and Authentication Algorithms

•   Encryption:
         Three-key triple DES
         RC5
         IDEA
         Three-key triple IDEA
         CAST
         Blowfish
         AES
         NULL
•   Authentication:
      HMAC-MD5-96
      HMAC-SHA-1-96




         Blekinge Institute of Technology
                                            Network Security
                                                               28
ESP Encryption and Authentication




Blekinge Institute of Technology
                                   Network Security
                                                      29
ESP Encryption and Authentication




Blekinge Institute of Technology
                                   Network Security
                                                      30
IPsec Operation Matrix

                            Transport Mode SA                 Tunnel Mode SA
AH                          Authenticates IP payload          Authenticates entire inner
                            and selected portions of IP       IP packet plus selected
                            header and IPv6 extension         portions of outer IP header
                            headers

ESP                         Encrypts IP payload and any Encrypts inner IP packet
                            IPv6 extension header




ESP with                    Encrypts IP payload and any Encrypts inner IP packet .
authentication              IPv6 extension header.       Authenticates inner IP
                            Authenticates IP payload but packet
                            no IP header




      Blekinge Institute of Technology
                                           Network Security
                                                                                            31
Internet Key Exchange

•   Involves the determination and distribution of secret keys
      Require four keys : transmit and recieve pairs for both integrity and
       confidentiality.


•   Two types:
      Manual : System administrator manually configures each system with its
       own keys and with keys of other communicating system

      Automated : Enables on-demand creation of keys for SAs
          – Oakley Key Determination Protocol
          – Internet Security Association and Key Management Protocol (ISAKMP)




      Blekinge Institute of Technology
                                         Network Security
                                                                                 32
Internet Key Exchange

•   Key Management Protocols
•   Oakley Key Determination Protocol : (Reading Assignment)
     The Oakley Key Determination Protocol is a key-agreement protocol that
      allows authenticated parties to exchange keying material across an
      insecure connection using the Diffie-Hellman key exchange algorithm.
     Based on Diffie-Hellman algorithm
     Generic : doesn’t provide specific format


•   Internet Security Association and Key Management Protocol
    (ISAKMP)
     The ISAKMP provides a framework for authentication and key exchange,
      with actual authenticated keying material
     Provides a framework for Internet Key management
     Provides specific protocol support such as formats



      Blekinge Institute of Technology
                                         Network Security
                                                                               33
ISAKMP

•   A protocol defined for establishing Security Associations (SA) and
    cryptographic keys in an Internet environment.

•   ISAKMP only provides a framework for authentication and key
    exchange and is designed to be key exchange independent;
    protocols



•   ISAKMP defines the procedures
     for authenticating a communicating peer
     creation and management of Security Associations
     key generation techniques,
     threat mitigation (e.g. denial of service and replay attacks).



      Blekinge Institute of Technology
                                          Network Security
                                                                         34
ISAKMP

•   ISAKMP defines payloads for exchanging key generation and
    authentication data.

•   ISAKMP is distinct from key exchange protocols
      There may be many different key exchange protocols, each with
       different security properties.
         – common framework is required for agreeing to the format of SA attributes, and
           for negotiating, modifying, and deleting SAs.
     ISAKMP serves as this common framework.




      Blekinge Institute of Technology
                                          Network Security
ISAKMP

•    A Preliminary SA is formed using this protocol; later a fresh keying is
    done.

•   ISAKMP can be implemented over any transport protocol.

•   All implementations must include send and receive capability for
    ISAKMP using UDP on port 500.




      Blekinge Institute of Technology
                                          Network Security
ISAKMP




Blekinge Institute of Technology
                                    Network Security
                                                       37
ISAKMP Payload Types

•   Key Exchange Payload
•   Certificate Payload (transfers a public key certificate)
•   Notification Payload (error messages)
•   Responder-Lifetime
•   Hash Payload
•   Signature Payload




      Blekinge Institute of Technology
                                         Network Security
                                                               38
Internet Key Exchange

•   Three authentication methods
     Digital signatures :(Reading Assignment)
       – a mathematical scheme for demonstrating the authenticity of a
          digital message or document
                • Exchange is authenticated by signing a mutually obtainable hash
                • Each party encrypts the hash with its private key
                • Hash is generated over important parameters such as user ID


     Public Key Encryption
       – The exchange is authenticated by encrypting parameters such as
         Ids with senders private key

     Symmetric Key Encryption
       – A key derived by some mechanism can be used to authenticate the
         exchange by symmetric encryption of exchange parameters.


      Blekinge Institute of Technology
                                         Network Security
                                                                                    39
Public-Key Encryption

 Public-key encryption
   – involves the use of asymmetric key algorithms
   – does not require a secure initial exchange of one or more secret
     keys to both sender and receiver.
   – related key pair: a secret private key and a published public key.




 Blekinge Institute of Technology
                                    Network Security
Public-Key Encryption




Blekinge Institute of Technology
                                   Network Security
                                                      41
Authentication using Public-Key System




Blekinge Institute of Technology
                                   Network Security
                                                      42
Symmetric Key Cryptography

 Symmetric-key encryption
   – Uses identical, cryptographic keys for both decryption and encryption
     etc.
   – shared secret between two or more parties that can be used to
     maintain a private information link.
   – Other terms for symmetric-key encryption are single-key, shared-key,
     one-key encryption.
   – Symmetric-key algorithms can be divided into
           •  stream ciphers: Stream ciphers encrypt the bits of the message one at a
             time
           • block ciphers: block ciphers take a number of bits and encrypt them as a
             single unit. Blocks of 64 bits have been commonly used.




 Blekinge Institute of Technology
                                     Network Security
                                                                                        43
Symmetric Key Cryptography




Blekinge Institute of Technology
                                   Network Security
                                                      44
Interesting Research Areas

•   DoS attacks
      Resource exhaustion


•   Policy conflicts
      SA bundles


•   Additional Readings
      http://www.unixwiz.net/techtips/iguide-ipsec.html
       http://technet.microsoft.com/en-us/network/bb531150
       http://www.tcpipguide.com/free/t_IPSecurityIPSecProtocols.htm
      http://technet.microsoft.com/en-us/library/bb742429.aspx (If you are
       interested in practical)




      Blekinge Institute of Technology
                                         Network Security
                                                                              45

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

block ciphers
block ciphersblock ciphers
block ciphers
 
Firewall & its configurations
Firewall & its configurationsFirewall & its configurations
Firewall & its configurations
 
IP Security
IP SecurityIP Security
IP Security
 
Ethernet protocol
Ethernet protocolEthernet protocol
Ethernet protocol
 
IP security
IP securityIP security
IP security
 
IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
DES
DESDES
DES
 
E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5
 
BAIT1103 Chapter 6
BAIT1103 Chapter 6BAIT1103 Chapter 6
BAIT1103 Chapter 6
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
 
IP Security
IP SecurityIP Security
IP Security
 
Ike
IkeIke
Ike
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 
Unit 1
Unit 1Unit 1
Unit 1
 
Idea(international data encryption algorithm)
Idea(international data encryption algorithm)Idea(international data encryption algorithm)
Idea(international data encryption algorithm)
 
Ipsec
IpsecIpsec
Ipsec
 
Ip Sec
Ip SecIp Sec
Ip Sec
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Point to-point protocol (ppp)
Point to-point protocol (ppp)Point to-point protocol (ppp)
Point to-point protocol (ppp)
 

Destaque

CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threatsAzri Abdin
 
Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threatswardjo
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket LayerNaveen Kumar
 

Destaque (6)

CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
 
Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threats
 
Web Security
Web SecurityWeb Security
Web Security
 
Secure electronic transaction (set)
Secure electronic transaction (set)Secure electronic transaction (set)
Secure electronic transaction (set)
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 

Semelhante a Lecture 5 ip security

Semelhante a Lecture 5 ip security (20)

Ip security
Ip security Ip security
Ip security
 
IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdf
 
Network Security_3rd Module_Dr. Shivashankar
Network Security_3rd Module_Dr. ShivashankarNetwork Security_3rd Module_Dr. Shivashankar
Network Security_3rd Module_Dr. Shivashankar
 
I psecurity
I psecurityI psecurity
I psecurity
 
I psec cisco
I psec ciscoI psec cisco
I psec cisco
 
Multilayer Security Architecture for Internet Protocols
Multilayer Security Architecture for Internet ProtocolsMultilayer Security Architecture for Internet Protocols
Multilayer Security Architecture for Internet Protocols
 
crypto.pptx
crypto.pptxcrypto.pptx
crypto.pptx
 
crypto.pptx
crypto.pptxcrypto.pptx
crypto.pptx
 
CNS UNIT-VI.pptx
CNS UNIT-VI.pptxCNS UNIT-VI.pptx
CNS UNIT-VI.pptx
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Cns unit4
Cns unit4Cns unit4
Cns unit4
 
Cns unit4
Cns unit4Cns unit4
Cns unit4
 
college assignment on Applications of ipsec
college assignment on Applications of ipsec college assignment on Applications of ipsec
college assignment on Applications of ipsec
 
Ip sec technote-en
Ip sec technote-enIp sec technote-en
Ip sec technote-en
 
8 Authentication Security Protocols
8 Authentication Security Protocols8 Authentication Security Protocols
8 Authentication Security Protocols
 
Ip sec
Ip secIp sec
Ip sec
 
Ipsecurity
IpsecurityIpsecurity
Ipsecurity
 
ch06.ppt
ch06.pptch06.ppt
ch06.ppt
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
I psec
I psecI psec
I psec
 

Mais de rajakhurram

Malicious software
Malicious softwareMalicious software
Malicious softwarerajakhurram
 
Lecture malicious software
Lecture malicious softwareLecture malicious software
Lecture malicious softwarerajakhurram
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software rajakhurram
 
Lecture 11 wifi security
Lecture 11 wifi securityLecture 11 wifi security
Lecture 11 wifi securityrajakhurram
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intrudersrajakhurram
 
Lecture 9 key distribution and user authentication
Lecture 9 key distribution and user authentication Lecture 9 key distribution and user authentication
Lecture 9 key distribution and user authentication rajakhurram
 
Lecture 7 certificates
Lecture 7 certificatesLecture 7 certificates
Lecture 7 certificatesrajakhurram
 
Lecture 6 web security
Lecture 6 web securityLecture 6 web security
Lecture 6 web securityrajakhurram
 
Lecture 4 firewalls
Lecture 4 firewallsLecture 4 firewalls
Lecture 4 firewallsrajakhurram
 
Lecture 3b public key_encryption
Lecture 3b public key_encryptionLecture 3b public key_encryption
Lecture 3b public key_encryptionrajakhurram
 
Lecture3a symmetric encryption
Lecture3a symmetric encryptionLecture3a symmetric encryption
Lecture3a symmetric encryptionrajakhurram
 
Lecture2 network attack
Lecture2 network attackLecture2 network attack
Lecture2 network attackrajakhurram
 
Lecture1 Introduction
Lecture1 Introduction Lecture1 Introduction
Lecture1 Introduction rajakhurram
 
Lecture 8 mail security
Lecture 8 mail securityLecture 8 mail security
Lecture 8 mail securityrajakhurram
 

Mais de rajakhurram (14)

Malicious software
Malicious softwareMalicious software
Malicious software
 
Lecture malicious software
Lecture malicious softwareLecture malicious software
Lecture malicious software
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
 
Lecture 11 wifi security
Lecture 11 wifi securityLecture 11 wifi security
Lecture 11 wifi security
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intruders
 
Lecture 9 key distribution and user authentication
Lecture 9 key distribution and user authentication Lecture 9 key distribution and user authentication
Lecture 9 key distribution and user authentication
 
Lecture 7 certificates
Lecture 7 certificatesLecture 7 certificates
Lecture 7 certificates
 
Lecture 6 web security
Lecture 6 web securityLecture 6 web security
Lecture 6 web security
 
Lecture 4 firewalls
Lecture 4 firewallsLecture 4 firewalls
Lecture 4 firewalls
 
Lecture 3b public key_encryption
Lecture 3b public key_encryptionLecture 3b public key_encryption
Lecture 3b public key_encryption
 
Lecture3a symmetric encryption
Lecture3a symmetric encryptionLecture3a symmetric encryption
Lecture3a symmetric encryption
 
Lecture2 network attack
Lecture2 network attackLecture2 network attack
Lecture2 network attack
 
Lecture1 Introduction
Lecture1 Introduction Lecture1 Introduction
Lecture1 Introduction
 
Lecture 8 mail security
Lecture 8 mail securityLecture 8 mail security
Lecture 8 mail security
 

Último

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 

Último (20)

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 

Lecture 5 ip security

  • 1. Blekinge Institute of Technology IP Security
  • 2. Outline • Passive Attacks • IP Security Overview  IP Security Architecture  Security Associations (SA)  Authentication Header  Encapsulating Security Payload (ESP) • Internet Key Exchange  Key Management Protocosl – Oakley – ISAKMP  Authentication Methods – Digital signatures – Public Key Encryption – Symmetric Key Encryption Blekinge Institute of Technology Network Security 2
  • 3. Recommended TCP/IP Reading • Comer, D. Internetworking with TCP/IP, Volume I: Principles, Protocols and Architecture. Prentic Hall, 1995 • Stevens, W. TCP/IP Illustrated, Volume 1: The Protocols. Addison-Wesley, 1994 Blekinge Institute of Technology Network Security 3
  • 4. Passive Attacks Blekinge Institute of Technology ET1318 - Network Security 4
  • 5. Interception Source Dest Darth This is an attack on confidentiality Blekinge Institute of Technology ET1318 - Network Security 5
  • 6. TCP/IP Example Blekinge Institute of Technology Network Security 6
  • 7. IP Security (Ipsec) Overview • General framework that allows a pair of communicating entities to use a set of algorithm for secure communication. • Not a single protocol but Protocol suite for securing Internet Protocol (IP) communications by  authenticating  encrypting each IP packet of a communication session. • includes protocols for establishing mutual authentication between a pair of communicating entities at the  beginning of the session  negotiation of cryptographic keys to be used during the session. Blekinge Institute of Technology Network Security 7
  • 8. IP Security Overview • Encrypt and/or authenticate all traffic at IP level. Thus, applications, e-mail, file transfer, WEB access can be secured.  Applications do not need to be specifically designed to use IPsec. • Applications of IPSec/VPN  Secure branch office connectivity over the Internet  Secure remote access over the Internet  Establishing connectivity with partners  Enhancing electronic commerce security Blekinge Institute of Technology Network Security 8
  • 9. IP Security Scenario Blekinge Institute of Technology Network Security 9
  • 10. IP Security Overview • Benefits of IPSec  Transparent to applications (below transport layer (TCP, UDP))  Provide security for individual users • IPSec can assure that:  A router or neighbor advertisement comes from an authorized router  A redirect message comes from the router to which the initial packet was sent  A routing update is not forged Blekinge Institute of Technology Network Security 10
  • 11. IP Security Architecture • IPSec documents:  RFC 2401: An overview of security architecture  RFC 2402: Description of a packet authentication extension to IPv4 and IPv6  RFC 2406: Description of a packet encryption extension to IPv4 and IPv6  RFC 2408: Specification of key management capabilities • IPsec uses the following protocols to perform various functions  Authentication Headers (AH)  Encapsulating Security Payloads (ESP)  Security associations (SA) Blekinge Institute of Technology Network Security 11
  • 12. IPSec modes of operation • IPSec can be implemented in a  host-to-host transport mode – Only the payload of the IP packet is encrypted and/or authenticated. – The routing is intact, since the IP header is neither modified nor encrypted. – Transport mode is used for host-to-host communications.  network tunnel mode – The entire IP packet is encrypted and/or authenticated. It is then encapsulated into a new IP packet with a new IP header. – Tunnel mode is used to create virtual private networks (VPN) for network-to- network communications (e.g. between routers to link sites), host-to-network communications (e.g. remote user access), and host-to-host communications (e.g. private chat). Blekinge Institute of Technology Network Security 12
  • 13. Security associations (SA) • A security association is simply the bundle of algorithms and parameters (such as keys)  used to encrypt and authenticate a particular flow in one direction (AH and/or ESP operations).  In bi-directional traffic, the flows are secured by a pair of security associations. • Security associations are established using the ISAKMP (Internet Security Association and Key Management Protocol)  ISAKMP defines the procedures for authenticating a communicating peer, creation and management of Security Associations, key generation techniques, and threat mitigation (e.g. denial of service and replay attacks).(From Wikipedia) Blekinge Institute of Technology Network Security 13
  • 14. Security Associations (SA) • A one way relationship between a sender and a receiver. • To decide what protection - for an outgoing packet, Ipsec is identified by three parameters:  Security Parameter Index (SPI)  IP Destination address  Security Protocol Identifier (is it an AH or an ESP?) (Similar procedure for an incoming packet) Blekinge Institute of Technology Network Security 14
  • 15. SA Parameters • A SA is defined by the following parameters:  Sequence Number Counter  Sequence Counter Overflow  Anti-replay Window  AH Information  ESP Information  Lifetime of this SA  IPSec protocol mode (Tunnel or Transport?)  Path MTU Blekinge Institute of Technology Network Security 15
  • 16. Combinations of Security Associations Blekinge Institute of Technology Network Security 16
  • 17. Combinations of Security Associations Blekinge Institute of Technology Network Security 17
  • 18. Combinations of Security Associations Blekinge Institute of Technology Network Security 18
  • 19. Combinations of Security Associations Blekinge Institute of Technology Network Security 19
  • 20. IPSec Document Overview Blekinge Institute of Technology Network Security 20
  • 21. Authentication Header • Access Control • Integrity • Data origin authentication • Rejection of replayed packets • Confidentiality (encryption) Blekinge Institute of Technology Network Security 21
  • 22. Before applying AH Blekinge Institute of Technology Network Security 22
  • 23. Transport Mode (AH Authentication) Blekinge Institute of Technology Network Security 23
  • 24. Tunnel Mode (AH Authentication) Blekinge Institute of Technology Network Security 24
  • 25. End-to-end versus End-to-Intermediate Authentication Blekinge Institute of Technology Network Security 25
  • 26. Encapsulating Security Payload • Provides  origin authenticity  integrity  confidentiality protection of packets. • ESP supports encryption-only and authentication-only  using encryption without authentication is strongly discouraged because it is insecure • ESP does not protect the IP packet header. • Tunnel Mode :  the entire original IP packet is encapsulated with a new packet header added  ESP protection is afforded to the whole inner IP packet (including the inner header) while the outer header remains unprotected. • ESP provides confidentiality services Blekinge Institute of Technology Network Security 26
  • 27. Encapsulating Security Payload Blekinge Institute of Technology Network Security
  • 28. Encryption and Authentication Algorithms • Encryption:  Three-key triple DES  RC5  IDEA  Three-key triple IDEA  CAST  Blowfish  AES  NULL • Authentication:  HMAC-MD5-96  HMAC-SHA-1-96 Blekinge Institute of Technology Network Security 28
  • 29. ESP Encryption and Authentication Blekinge Institute of Technology Network Security 29
  • 30. ESP Encryption and Authentication Blekinge Institute of Technology Network Security 30
  • 31. IPsec Operation Matrix Transport Mode SA Tunnel Mode SA AH Authenticates IP payload Authenticates entire inner and selected portions of IP IP packet plus selected header and IPv6 extension portions of outer IP header headers ESP Encrypts IP payload and any Encrypts inner IP packet IPv6 extension header ESP with Encrypts IP payload and any Encrypts inner IP packet . authentication IPv6 extension header. Authenticates inner IP Authenticates IP payload but packet no IP header Blekinge Institute of Technology Network Security 31
  • 32. Internet Key Exchange • Involves the determination and distribution of secret keys  Require four keys : transmit and recieve pairs for both integrity and confidentiality. • Two types:  Manual : System administrator manually configures each system with its own keys and with keys of other communicating system  Automated : Enables on-demand creation of keys for SAs – Oakley Key Determination Protocol – Internet Security Association and Key Management Protocol (ISAKMP) Blekinge Institute of Technology Network Security 32
  • 33. Internet Key Exchange • Key Management Protocols • Oakley Key Determination Protocol : (Reading Assignment)  The Oakley Key Determination Protocol is a key-agreement protocol that allows authenticated parties to exchange keying material across an insecure connection using the Diffie-Hellman key exchange algorithm.  Based on Diffie-Hellman algorithm  Generic : doesn’t provide specific format • Internet Security Association and Key Management Protocol (ISAKMP)  The ISAKMP provides a framework for authentication and key exchange, with actual authenticated keying material  Provides a framework for Internet Key management  Provides specific protocol support such as formats Blekinge Institute of Technology Network Security 33
  • 34. ISAKMP • A protocol defined for establishing Security Associations (SA) and cryptographic keys in an Internet environment. • ISAKMP only provides a framework for authentication and key exchange and is designed to be key exchange independent; protocols • ISAKMP defines the procedures  for authenticating a communicating peer  creation and management of Security Associations  key generation techniques,  threat mitigation (e.g. denial of service and replay attacks). Blekinge Institute of Technology Network Security 34
  • 35. ISAKMP • ISAKMP defines payloads for exchanging key generation and authentication data. • ISAKMP is distinct from key exchange protocols  There may be many different key exchange protocols, each with different security properties. – common framework is required for agreeing to the format of SA attributes, and for negotiating, modifying, and deleting SAs.  ISAKMP serves as this common framework. Blekinge Institute of Technology Network Security
  • 36. ISAKMP • A Preliminary SA is formed using this protocol; later a fresh keying is done. • ISAKMP can be implemented over any transport protocol. • All implementations must include send and receive capability for ISAKMP using UDP on port 500. Blekinge Institute of Technology Network Security
  • 37. ISAKMP Blekinge Institute of Technology Network Security 37
  • 38. ISAKMP Payload Types • Key Exchange Payload • Certificate Payload (transfers a public key certificate) • Notification Payload (error messages) • Responder-Lifetime • Hash Payload • Signature Payload Blekinge Institute of Technology Network Security 38
  • 39. Internet Key Exchange • Three authentication methods  Digital signatures :(Reading Assignment) – a mathematical scheme for demonstrating the authenticity of a digital message or document • Exchange is authenticated by signing a mutually obtainable hash • Each party encrypts the hash with its private key • Hash is generated over important parameters such as user ID  Public Key Encryption – The exchange is authenticated by encrypting parameters such as Ids with senders private key  Symmetric Key Encryption – A key derived by some mechanism can be used to authenticate the exchange by symmetric encryption of exchange parameters. Blekinge Institute of Technology Network Security 39
  • 40. Public-Key Encryption  Public-key encryption – involves the use of asymmetric key algorithms – does not require a secure initial exchange of one or more secret keys to both sender and receiver. – related key pair: a secret private key and a published public key. Blekinge Institute of Technology Network Security
  • 41. Public-Key Encryption Blekinge Institute of Technology Network Security 41
  • 42. Authentication using Public-Key System Blekinge Institute of Technology Network Security 42
  • 43. Symmetric Key Cryptography  Symmetric-key encryption – Uses identical, cryptographic keys for both decryption and encryption etc. – shared secret between two or more parties that can be used to maintain a private information link. – Other terms for symmetric-key encryption are single-key, shared-key, one-key encryption. – Symmetric-key algorithms can be divided into • stream ciphers: Stream ciphers encrypt the bits of the message one at a time • block ciphers: block ciphers take a number of bits and encrypt them as a single unit. Blocks of 64 bits have been commonly used. Blekinge Institute of Technology Network Security 43
  • 44. Symmetric Key Cryptography Blekinge Institute of Technology Network Security 44
  • 45. Interesting Research Areas • DoS attacks  Resource exhaustion • Policy conflicts  SA bundles • Additional Readings  http://www.unixwiz.net/techtips/iguide-ipsec.html http://technet.microsoft.com/en-us/network/bb531150 http://www.tcpipguide.com/free/t_IPSecurityIPSecProtocols.htm  http://technet.microsoft.com/en-us/library/bb742429.aspx (If you are interested in practical) Blekinge Institute of Technology Network Security 45