SlideShare a Scribd company logo
Cryptography and Network
Security
Third Edition
by William Stallings
Lecture slides by Lawrie Brown
The need...
• In CERTs 2001 annual report it listed
52,000 security incidents
• the most serious involving:
• IP spoofing
• intruders creating packets with false address then
taking advantages of OS exploits
• eavesdropping and sniffing
• attackers listen for userids and passwords and then
just walk into target systems
• as a result the IAB included authentication and
encryption in the next generation IP (IPv6)
IP Security
• We’ve considered some application specific
security mechanisms
• eg. S/MIME, PGP, Kerberos, SSL/HTTPS
• however there are security concerns that cut
across protocol layers
• would like security implemented by the
network for all applications
IPSec
• general IP Security mechanisms
• provides
• authentication
• confidentiality
• key management
• applicable to use over LANs, across public
& private WANs, & for the Internet
IPSec Uses
Benefits of IPSec
• in a firewall/router provides strong security to all traffic
crossing the perimeter
• is resistant to bypass
• is below transport layer, hence transparent to
applications
• can be transparent to end users
• can provide security for individual users if desired
• additionally in routing applications:
• assure that router advertisments come from authorized routers
• neighbor advertisments come from authorized routers
• insure redirect messages come from the router to which initial
packet was sent
• insure no forging of router updates
IP Security Architecture
• RFC 2401 (Primary RFC)
• specification is quite complex
• defined in numerous RFC’s
• incl. RFC 2401/2402/2406/2408
• many others, grouped by category
• mandatory in IPv6, optional in IPv4
IPSec Services
• Two protocols are used to provide security:
• Authentication Header Protocol (AH)
• Encapsulation Security Payload (ESP)
• Services provided are:
• Access control
• Connectionless integrity
• Data origin authentication
• Rejection of replayed packets
• a form of partial sequence integrity
• Confidentiality (encryption)
• Limited traffic flow confidentiality
Security Associations
• a one-way relationship between sender & receiver
that affords security for traffic flow
• defined by 3 parameters:
• Security Parameters Index (SPI)
• a bit string
• IP Destination Address
• only unicast allowed
• could be end user, firewall, router
• Security Protocol Identifier
• indicates if SA is AH or ESP
• has a number of other parameters
• seq no, AH & EH info, lifetime etc
• have a database of Security Associations
Authentication Header (AH)
• RFC 2402
• provides support for data integrity & authentication of IP
packets
• end system/router can authenticate user/app
• prevents address spoofing attacks by tracking sequence numbers
• based on use of a MAC (message authentication code)
• HMAC-MD5-96 or HMAC-SHA-1-96
• MAC is calculated:
• immutable IP header fields
• AH header (except for Authentication Data field)
• the entire upper-level protocol data (immutable)
• parties must share a secret key
Authentication Header
Transport and Tunnel Modes
• Both AH and ESP have two modes
• transport mode is used to encrypt & optionally
authenticate IP data
• data protected but header left in clear
• can do traffic analysis but is efficient
• good for ESP host to host traffic
• tunnel mode encrypts entire IP packet
• add new header for next hop
• good for VPNs, gateway to gateway security
Transport & Tunnel Modes
Encapsulating Security Payload (ESP)
• RFC 2406
• provides message content confidentiality &
limited traffic flow confidentiality
• can optionally provide the same
authentication services as AH
• supports range of ciphers, modes, padding
• incl. DES, Triple-DES, RC5, IDEA, CAST etc
• CBC most common
• pad to meet blocksize, for traffic flow
Encapsulating Security Payload
Combining Security Associations
• SA’s can implement either AH or ESP
• to implement both need to combine SA’s
• form a security bundle
• have 4 cases (see next)
Combining Security Associations
a. AH in transport mode
b.ESP in transport mode
c. AH followed by ESP in transport mode(ESP SA inside an AH SA
d. any one a, b, c inside an AH or ESP in tunnel mode
Key Management
• handles key generation & distribution
• typically need 2 pairs of keys
• 2 per direction for AH & ESP
• manual key management
• sysadmin manually configures every system
• automated key management
• automated system for on demand creation of keys for
SA’s in large systems
• has Oakley & ISAKMP elements
Oakley
• RFC 2412
• a key exchange protocol
• based on Diffie-Hellman key exchange
• adds features to address weaknesses
• cookies, groups (global params), nonces, DH
key exchange with authentication
• can use arithmetic in prime fields or elliptic
curve fields
ISAKMP
• Internet Security Association and Key
Management Protocol (RFC 2407)
• provides framework for key management
• defines procedures and packet formats to
establish, negotiate, modify and delete SAs
• independent of key exchange protocol,
encryption algorithm and authentication method
ISAKMP
Summary
• have considered:
• IPSec security framework
• AH Protocol
• ESP Protocol
• key management & Oakley/ISAKMP

More Related Content

PPT
PDF
CNIT 141 13. TLS
PPTX
IPSec | Computer Network
PDF
20 palo alto site to site
PPT
The Security layer
PDF
IP security and VPN presentation
PDF
CNIT 141: 13. TLS
PDF
IP Security
CNIT 141 13. TLS
IPSec | Computer Network
20 palo alto site to site
The Security layer
IP security and VPN presentation
CNIT 141: 13. TLS
IP Security

What's hot (20)

PDF
CNIT 141: 13. TLS
PDF
18CS2005 Cryptography and Network Security
PPTX
Encryption
PDF
3 palo alto ngfw architecture overview
PDF
CNIT 123 8: Desktop and Server OS Vulnerabilities
PDF
Palo alto outline course | Mostafa El Lathy
PDF
BAIT1103 Chapter 4
PDF
APIdays Barcelona 2019 - Introduction to Onion Services to secure APIs with P...
PPSX
Secure socket layer
PDF
CNIT 123: 6: Enumeration
PPT
Wi fi protected-access
PDF
13 palo alto url web filtering concept
PDF
15 intro to ssl certificate & pki concept
PPTX
Wireless Security null seminar
PPTX
Wpa vs Wpa2
PPSX
authentication and access control(http://4knet.ir)
PPSX
BSET_Lecture_Crypto and SSL_Overview_FINAL
PPTX
Wireless Network Security
PDF
Wireless Cracking using Kali
PPT
Secure socket later
CNIT 141: 13. TLS
18CS2005 Cryptography and Network Security
Encryption
3 palo alto ngfw architecture overview
CNIT 123 8: Desktop and Server OS Vulnerabilities
Palo alto outline course | Mostafa El Lathy
BAIT1103 Chapter 4
APIdays Barcelona 2019 - Introduction to Onion Services to secure APIs with P...
Secure socket layer
CNIT 123: 6: Enumeration
Wi fi protected-access
13 palo alto url web filtering concept
15 intro to ssl certificate & pki concept
Wireless Security null seminar
Wpa vs Wpa2
authentication and access control(http://4knet.ir)
BSET_Lecture_Crypto and SSL_Overview_FINAL
Wireless Network Security
Wireless Cracking using Kali
Secure socket later
Ad

Viewers also liked (20)

PPTX
IP Security
PPTX
Turing machine-TOC
PPTX
Java history, versions, types of errors and exception, quiz
PPTX
Data mining
PPTX
remote sensor
PDF
6. The grid-COMPUTING OGSA and WSRF
PPTX
Distributed file system
PDF
Distributed Operating System_2
PDF
PPT
Multiple Access in wireless communication
PPTX
Ccleaner presentation
PPTX
optimization of DFA
PPTX
Distributed shred memory architecture
PDF
Distributed computing
PDF
Soft computing
PPTX
PPTX
Synchronization - Election Algorithms
PDF
5. Distributed Operating Systems
IP Security
Turing machine-TOC
Java history, versions, types of errors and exception, quiz
Data mining
remote sensor
6. The grid-COMPUTING OGSA and WSRF
Distributed file system
Distributed Operating System_2
Multiple Access in wireless communication
Ccleaner presentation
optimization of DFA
Distributed shred memory architecture
Distributed computing
Soft computing
Synchronization - Election Algorithms
5. Distributed Operating Systems
Ad

Similar to Ip sec (20)

PPTX
IP SEC.ptx
PPTX
Cryptography and Network security # Lecture 8
PPT
PDF
BAIT1103 Chapter 6
PPTX
ssl-tls-ipsec-vpn.pptx
PPT
ICS PPT Unit 4.ppt
PPTX
CryptoStandards and protocols for digital secure communications
PPT
IS Unit-4 .ppt
PPT
Ip sec and ssl
PPTX
EOC MODULE 3 IP security - SR.pptx engineering college
PPTX
chAPTER 19 INTERNET PROTOCOL SECURITY PRESENTATION
PDF
CNS ppt.pdf
PPT
ch22.ppt
PPT
Ip sec talk
PPT
Chapter_4_InternetSecurity.pptChapter_4_InternetSecurity.pptChapter_4_Interne...
PPT
Chapter_4_InternetSecurity.pptChapter_4_InternetSecurity.pptChapter_4_Interne...
PPT
taub-IPsec network security in network.ppt
PPTX
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
IP SEC.ptx
Cryptography and Network security # Lecture 8
BAIT1103 Chapter 6
ssl-tls-ipsec-vpn.pptx
ICS PPT Unit 4.ppt
CryptoStandards and protocols for digital secure communications
IS Unit-4 .ppt
Ip sec and ssl
EOC MODULE 3 IP security - SR.pptx engineering college
chAPTER 19 INTERNET PROTOCOL SECURITY PRESENTATION
CNS ppt.pdf
ch22.ppt
Ip sec talk
Chapter_4_InternetSecurity.pptChapter_4_InternetSecurity.pptChapter_4_Interne...
Chapter_4_InternetSecurity.pptChapter_4_InternetSecurity.pptChapter_4_Interne...
taub-IPsec network security in network.ppt
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY

Ip sec

  • 1. Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown
  • 2. The need... • In CERTs 2001 annual report it listed 52,000 security incidents • the most serious involving: • IP spoofing • intruders creating packets with false address then taking advantages of OS exploits • eavesdropping and sniffing • attackers listen for userids and passwords and then just walk into target systems • as a result the IAB included authentication and encryption in the next generation IP (IPv6)
  • 3. IP Security • We’ve considered some application specific security mechanisms • eg. S/MIME, PGP, Kerberos, SSL/HTTPS • however there are security concerns that cut across protocol layers • would like security implemented by the network for all applications
  • 4. IPSec • general IP Security mechanisms • provides • authentication • confidentiality • key management • applicable to use over LANs, across public & private WANs, & for the Internet
  • 6. Benefits of IPSec • in a firewall/router provides strong security to all traffic crossing the perimeter • is resistant to bypass • is below transport layer, hence transparent to applications • can be transparent to end users • can provide security for individual users if desired • additionally in routing applications: • assure that router advertisments come from authorized routers • neighbor advertisments come from authorized routers • insure redirect messages come from the router to which initial packet was sent • insure no forging of router updates
  • 7. IP Security Architecture • RFC 2401 (Primary RFC) • specification is quite complex • defined in numerous RFC’s • incl. RFC 2401/2402/2406/2408 • many others, grouped by category • mandatory in IPv6, optional in IPv4
  • 8. IPSec Services • Two protocols are used to provide security: • Authentication Header Protocol (AH) • Encapsulation Security Payload (ESP) • Services provided are: • Access control • Connectionless integrity • Data origin authentication • Rejection of replayed packets • a form of partial sequence integrity • Confidentiality (encryption) • Limited traffic flow confidentiality
  • 9. Security Associations • a one-way relationship between sender & receiver that affords security for traffic flow • defined by 3 parameters: • Security Parameters Index (SPI) • a bit string • IP Destination Address • only unicast allowed • could be end user, firewall, router • Security Protocol Identifier • indicates if SA is AH or ESP • has a number of other parameters • seq no, AH & EH info, lifetime etc • have a database of Security Associations
  • 10. Authentication Header (AH) • RFC 2402 • provides support for data integrity & authentication of IP packets • end system/router can authenticate user/app • prevents address spoofing attacks by tracking sequence numbers • based on use of a MAC (message authentication code) • HMAC-MD5-96 or HMAC-SHA-1-96 • MAC is calculated: • immutable IP header fields • AH header (except for Authentication Data field) • the entire upper-level protocol data (immutable) • parties must share a secret key
  • 12. Transport and Tunnel Modes • Both AH and ESP have two modes • transport mode is used to encrypt & optionally authenticate IP data • data protected but header left in clear • can do traffic analysis but is efficient • good for ESP host to host traffic • tunnel mode encrypts entire IP packet • add new header for next hop • good for VPNs, gateway to gateway security
  • 14. Encapsulating Security Payload (ESP) • RFC 2406 • provides message content confidentiality & limited traffic flow confidentiality • can optionally provide the same authentication services as AH • supports range of ciphers, modes, padding • incl. DES, Triple-DES, RC5, IDEA, CAST etc • CBC most common • pad to meet blocksize, for traffic flow
  • 16. Combining Security Associations • SA’s can implement either AH or ESP • to implement both need to combine SA’s • form a security bundle • have 4 cases (see next)
  • 17. Combining Security Associations a. AH in transport mode b.ESP in transport mode c. AH followed by ESP in transport mode(ESP SA inside an AH SA d. any one a, b, c inside an AH or ESP in tunnel mode
  • 18. Key Management • handles key generation & distribution • typically need 2 pairs of keys • 2 per direction for AH & ESP • manual key management • sysadmin manually configures every system • automated key management • automated system for on demand creation of keys for SA’s in large systems • has Oakley & ISAKMP elements
  • 19. Oakley • RFC 2412 • a key exchange protocol • based on Diffie-Hellman key exchange • adds features to address weaknesses • cookies, groups (global params), nonces, DH key exchange with authentication • can use arithmetic in prime fields or elliptic curve fields
  • 20. ISAKMP • Internet Security Association and Key Management Protocol (RFC 2407) • provides framework for key management • defines procedures and packet formats to establish, negotiate, modify and delete SAs • independent of key exchange protocol, encryption algorithm and authentication method
  • 22. Summary • have considered: • IPSec security framework • AH Protocol • ESP Protocol • key management & Oakley/ISAKMP

Editor's Notes

  • #6: Stallings Fig 16-1.
  • #12: Stallings Fig 16-3.
  • #14: Stallings Fig 16-5.
  • #16: Stallings Fig 16-7.
  • #18: Stallings Fig 16-10.
  • #22: Stallings Fig 16-12.