SlideShare a Scribd company logo
2
Most read
7
Most read
8
Most read
10-Dec-16 1
Ambo University
Institute of Technology
Gradute program in Computer Science
IP SECURITY
Presented By:
Dejene Techane
In today's massively interconnected business world of the Internet, intranets, branch offices, and
remote access, sensitive information constantly crosses the networks.
Without security, both public and private networks are susceptible to unauthorized monitoring
and access.
Therefore, there are different network security protocols widespread use for protecting private
and public networks such as
 IP Security(IPSec),
 Transport Layer Security(TLS)
 and Secure Shell(SSH) .
Hence, only IPsec protects all application traffic over an IP network.
10-Dec-16 2
IP security refers to security mechanism implemented at the IP
(Internet Protocol) Layer to ensure
integrity,
authentication and
 confidentiality of data during transmission in the open Internet environment
It is a protocol suite for secure IP communications that works by
Authenticating
And encrypting each IP packet of a communication session.
10-Dec-16 3
IPSec is a set of protocol and algorithm used to secure IP
data and network layer
Open standard for VPN implementation
Inbuilt in IPV6 and compatible with IPV4
10-Dec-16 4
to verify sources of IP packets
authentication
to prevent replaying of old packets
to protect integrity and/or confidentiality of packets
data Integrity/Data Encryption
10-Dec-16 5
10-Dec-16 6
ESP AH
IKE
IPSec Security Policy
Encapsulating Security
Payload
Authentication Header
The Internet Key Exchange
 Architecture: Covers the general concepts, security requirements, definitions and
mechanisms defining IPsec technology.
Provides source authentication
Protects against source spoofing
Provides connectionless data integrity
Protects against replay attacks
Use monotonically increasing sequence numbers
Protects against denial of service attacks
NO protection for confidentiality!
10-Dec-16 7
Use 32-bit monotonically increasing sequence number to avoid replay
attacks
Use cryptographically strong hash algorithms to protect data integrity
(96-bit)
Use symmetric key cryptography
HMAC-SHA-96, HMAC-MD5-96
10-Dec-16 8
10-Dec-16 9
Authentication Data
Sequence Number
Security Parameters Index (SPI)
Next
header
Payload
length
Reserved
Old IP header (only in Tunnel mode)
TCP header
New IP header
Authenticated
Data
Encapsulated
TCP or IP packet
Hash of everything
else
Provides all that AH offers, and
in addition provides data confidentiality
Uses symmetric key encryption
Same as AH:
◦ Use 32-bit sequence number to counter replaying attacks
◦ Use integrity check algorithms
Only in ESP:
◦ Data confidentiality:
◦ Uses symmetric key encryption algorithms to encrypt packets
10-Dec-16 10
10-Dec-16 11
Authentication Data
Sequence Number
Security Parameters Index (SPI)
Next
header
Payload
length
Reserved
TCP header
Authenticated
IP header
Initialization vector
Data
Pad Pad length Next
Encrypted TCP
packet
10-Dec-16 12
 Bothe AH and ESP support transport and Tunnel modes
Transport Mode SA Tunnel Mode SA
AH Authenticates IP payload
and selected portions of IP
header and IPv6 extension
headers
Authenticates entire inner
IP packet plus selected
portions of outer IP header
ESP Encrypts IP payload and
any IPv6 extension header
Encrypts inner IP packet
ESP with
Authentication
Encrypts IP payload and
any IPv6 extension header
Authenticates IP payload
but no IP header
Encrypts inner IP packet
Authenticates inner IP
packet
 The key management portion of IPSec involves
 the determination and distribution of the secret keys.
 A typical requirement is four keys for communication between
two applications:
 transmit and receive pairs for both AH and ESP
 Support for two types of key management
 Manual
 Authomatic
10-Dec-16 13
10-Dec-16 14
SA describes a particular kind of secure connection between
one device and another.
Security Associations are key to IPSEC’s authentication and
confidentiality mechanisms.
SAs are needed to negotiate in the exchange of the “shared
secret” process
 Sharing the shared key secrete
uniquely identified by three parameters:
Security Parameters Index (SPI): The SPI assigns a bit string to this SA that has
local significance only.
 The SPI is carried in AH and ESP headers to enable the receiving system to select the
SA under which a received packet will be processed.
IP destination address : Currently, only unicast addresses are allowed; this is the
address of the destination endpoint of the SA, which may be an end-user system or
a network system such as a firewall or router.
Security protocol identifier : This indicates whether the association is an AH or
ESP security association.
10-Dec-16 15
Provides strong security when implemented in a firewall or router
that can be applied to all traffic crossing the perimeter.
IPsec is resistant to bypass if all traffic from the outside must use
IP and the firewall is the only way of entrance from the Internet into
the organization.
 Is below transport layer, hence transparent to applications.
Can be transparent to end users.
Can provide security for individual users if needed.
10-Dec-16 16
Secure branch office connectivity over the Internet
Secure remote access over the Internet
Establishment of extranet and intranet connectivity with partners
Enhancement of electronic commerce security
10-Dec-16 17
IP Security importance is growing, but unfortunately its operation
imposes a significant burden on the encrypting devices. Furthermore,
certain applications may suffer from the increase in latency (i.e., the
time required to pass through an IPSec network device) due to the
extra processing.
Finally, at a time when network security is increasingly vital, IPSec
makes it easy for network managers to provide a strong layer of
protection to their organization's information resources.
10-Dec-16 18
10-Dec-16 19

More Related Content

PDF
IP Security
PPTX
IP Security
PPT
authentication.ppt
PDF
Electronic mail security
PDF
IPSec (Internet Protocol Security) - PART 1
PPTX
Internet Key Exchange Protocol
PPTX
RSA ALGORITHM
PDF
CNIT 141: 8. Authenticated Encryption
IP Security
IP Security
authentication.ppt
Electronic mail security
IPSec (Internet Protocol Security) - PART 1
Internet Key Exchange Protocol
RSA ALGORITHM
CNIT 141: 8. Authenticated Encryption

What's hot (20)

PPT
block ciphers
PPTX
SHA- Secure hashing algorithm
PPT
Secure Socket Layer
PPTX
Message digest 5
PPTX
Network security model.pptx
PPTX
Public Key Cryptography
PPTX
Secure Socket Layer (SSL)
PPT
Message authentication
 
PPT
Firewall & its configurations
PPT
Lecture 5 ip security
PPTX
Firewall in Network Security
PDF
Network security - OSI Security Architecture
PPTX
MAC-Message Authentication Codes
PPT
Message Authentication Code & HMAC
PPT
Network security cryptographic hash function
PPTX
Intrusion detection and prevention system
PDF
Cs8792 cns - unit iv
PDF
MD-5 : Algorithm
PPTX
System security
PPTX
Symmetric and asymmetric key cryptography
block ciphers
SHA- Secure hashing algorithm
Secure Socket Layer
Message digest 5
Network security model.pptx
Public Key Cryptography
Secure Socket Layer (SSL)
Message authentication
 
Firewall & its configurations
Lecture 5 ip security
Firewall in Network Security
Network security - OSI Security Architecture
MAC-Message Authentication Codes
Message Authentication Code & HMAC
Network security cryptographic hash function
Intrusion detection and prevention system
Cs8792 cns - unit iv
MD-5 : Algorithm
System security
Symmetric and asymmetric key cryptography
Ad

Similar to IP Security (20)

PPTX
PDF
ipsec.pdfgvdgvdgdgdgddgdgdgdgdgdgdgdgdgd
PPTX
Module3 rnbtybtybntrbnbrtrg56g56h6yh6yh7yh5h655PPT.pptx
PPT
IS Unit-4 .ppt
PPTX
IPSec and VPN
PPTX
IP SEC.ptx
PPT
The Security layer
PPTX
Cryptography and network security
PPTX
chAPTER 19 INTERNET PROTOCOL SECURITY PRESENTATION
PPTX
EOC MODULE 3 IP security - SR.pptx engineering college
PPTX
Ip security
PPT
IP security Part 1
 
PPT
Chapter_4_InternetSecurity.pptChapter_4_InternetSecurity.pptChapter_4_Interne...
PPT
ipsec internet security in network and system.ppt
PPTX
Ipsec 2
PPT
IPSec(Somesh Jha).ppt IPSex Training ppt
PDF
IPsec for IMS
PPT
PDF
BAIT1103 Chapter 6
PPTX
CNS UNIT-VI.pptx
ipsec.pdfgvdgvdgdgdgddgdgdgdgdgdgdgdgdgd
Module3 rnbtybtybntrbnbrtrg56g56h6yh6yh7yh5h655PPT.pptx
IS Unit-4 .ppt
IPSec and VPN
IP SEC.ptx
The Security layer
Cryptography and network security
chAPTER 19 INTERNET PROTOCOL SECURITY PRESENTATION
EOC MODULE 3 IP security - SR.pptx engineering college
Ip security
IP security Part 1
 
Chapter_4_InternetSecurity.pptChapter_4_InternetSecurity.pptChapter_4_Interne...
ipsec internet security in network and system.ppt
Ipsec 2
IPSec(Somesh Jha).ppt IPSex Training ppt
IPsec for IMS
BAIT1103 Chapter 6
CNS UNIT-VI.pptx
Ad

More from Ambo University (10)

PDF
Advanced Java Programming
PDF
Advanced Java Programming
PDF
Advanced Java Programming
PDF
Advanced Java Programming
PDF
Advanced Java Programming
PDF
Advanced Java Programming
PPTX
Networked user interface
PPTX
Networked user interface
PDF
Advanced Java Programming
PDF
Advanced Java Programming
Advanced Java Programming
Advanced Java Programming
Advanced Java Programming
Advanced Java Programming
Advanced Java Programming
Advanced Java Programming
Networked user interface
Networked user interface
Advanced Java Programming
Advanced Java Programming

Recently uploaded (20)

PPTX
MYSQL Presentation for SQL database connectivity
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Machine learning based COVID-19 study performance prediction
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
A Presentation on Artificial Intelligence
PPTX
Big Data Technologies - Introduction.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Approach and Philosophy of On baking technology
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
MYSQL Presentation for SQL database connectivity
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Per capita expenditure prediction using model stacking based on satellite ima...
Machine learning based COVID-19 study performance prediction
The AUB Centre for AI in Media Proposal.docx
20250228 LYD VKU AI Blended-Learning.pptx
CIFDAQ's Market Insight: SEC Turns Pro Crypto
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Network Security Unit 5.pdf for BCA BBA.
NewMind AI Weekly Chronicles - August'25 Week I
A Presentation on Artificial Intelligence
Big Data Technologies - Introduction.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Approach and Philosophy of On baking technology
Digital-Transformation-Roadmap-for-Companies.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025

IP Security

  • 1. 10-Dec-16 1 Ambo University Institute of Technology Gradute program in Computer Science IP SECURITY Presented By: Dejene Techane
  • 2. In today's massively interconnected business world of the Internet, intranets, branch offices, and remote access, sensitive information constantly crosses the networks. Without security, both public and private networks are susceptible to unauthorized monitoring and access. Therefore, there are different network security protocols widespread use for protecting private and public networks such as  IP Security(IPSec),  Transport Layer Security(TLS)  and Secure Shell(SSH) . Hence, only IPsec protects all application traffic over an IP network. 10-Dec-16 2
  • 3. IP security refers to security mechanism implemented at the IP (Internet Protocol) Layer to ensure integrity, authentication and  confidentiality of data during transmission in the open Internet environment It is a protocol suite for secure IP communications that works by Authenticating And encrypting each IP packet of a communication session. 10-Dec-16 3
  • 4. IPSec is a set of protocol and algorithm used to secure IP data and network layer Open standard for VPN implementation Inbuilt in IPV6 and compatible with IPV4 10-Dec-16 4
  • 5. to verify sources of IP packets authentication to prevent replaying of old packets to protect integrity and/or confidentiality of packets data Integrity/Data Encryption 10-Dec-16 5
  • 6. 10-Dec-16 6 ESP AH IKE IPSec Security Policy Encapsulating Security Payload Authentication Header The Internet Key Exchange  Architecture: Covers the general concepts, security requirements, definitions and mechanisms defining IPsec technology.
  • 7. Provides source authentication Protects against source spoofing Provides connectionless data integrity Protects against replay attacks Use monotonically increasing sequence numbers Protects against denial of service attacks NO protection for confidentiality! 10-Dec-16 7
  • 8. Use 32-bit monotonically increasing sequence number to avoid replay attacks Use cryptographically strong hash algorithms to protect data integrity (96-bit) Use symmetric key cryptography HMAC-SHA-96, HMAC-MD5-96 10-Dec-16 8
  • 9. 10-Dec-16 9 Authentication Data Sequence Number Security Parameters Index (SPI) Next header Payload length Reserved Old IP header (only in Tunnel mode) TCP header New IP header Authenticated Data Encapsulated TCP or IP packet Hash of everything else
  • 10. Provides all that AH offers, and in addition provides data confidentiality Uses symmetric key encryption Same as AH: ◦ Use 32-bit sequence number to counter replaying attacks ◦ Use integrity check algorithms Only in ESP: ◦ Data confidentiality: ◦ Uses symmetric key encryption algorithms to encrypt packets 10-Dec-16 10
  • 11. 10-Dec-16 11 Authentication Data Sequence Number Security Parameters Index (SPI) Next header Payload length Reserved TCP header Authenticated IP header Initialization vector Data Pad Pad length Next Encrypted TCP packet
  • 12. 10-Dec-16 12  Bothe AH and ESP support transport and Tunnel modes Transport Mode SA Tunnel Mode SA AH Authenticates IP payload and selected portions of IP header and IPv6 extension headers Authenticates entire inner IP packet plus selected portions of outer IP header ESP Encrypts IP payload and any IPv6 extension header Encrypts inner IP packet ESP with Authentication Encrypts IP payload and any IPv6 extension header Authenticates IP payload but no IP header Encrypts inner IP packet Authenticates inner IP packet
  • 13.  The key management portion of IPSec involves  the determination and distribution of the secret keys.  A typical requirement is four keys for communication between two applications:  transmit and receive pairs for both AH and ESP  Support for two types of key management  Manual  Authomatic 10-Dec-16 13
  • 14. 10-Dec-16 14 SA describes a particular kind of secure connection between one device and another. Security Associations are key to IPSEC’s authentication and confidentiality mechanisms. SAs are needed to negotiate in the exchange of the “shared secret” process  Sharing the shared key secrete
  • 15. uniquely identified by three parameters: Security Parameters Index (SPI): The SPI assigns a bit string to this SA that has local significance only.  The SPI is carried in AH and ESP headers to enable the receiving system to select the SA under which a received packet will be processed. IP destination address : Currently, only unicast addresses are allowed; this is the address of the destination endpoint of the SA, which may be an end-user system or a network system such as a firewall or router. Security protocol identifier : This indicates whether the association is an AH or ESP security association. 10-Dec-16 15
  • 16. Provides strong security when implemented in a firewall or router that can be applied to all traffic crossing the perimeter. IPsec is resistant to bypass if all traffic from the outside must use IP and the firewall is the only way of entrance from the Internet into the organization.  Is below transport layer, hence transparent to applications. Can be transparent to end users. Can provide security for individual users if needed. 10-Dec-16 16
  • 17. Secure branch office connectivity over the Internet Secure remote access over the Internet Establishment of extranet and intranet connectivity with partners Enhancement of electronic commerce security 10-Dec-16 17
  • 18. IP Security importance is growing, but unfortunately its operation imposes a significant burden on the encrypting devices. Furthermore, certain applications may suffer from the increase in latency (i.e., the time required to pass through an IPSec network device) due to the extra processing. Finally, at a time when network security is increasingly vital, IPSec makes it easy for network managers to provide a strong layer of protection to their organization's information resources. 10-Dec-16 18